Basic ransomware proof of concept with Python 3.7.
☆57Apr 11, 2019Updated 6 years ago
Alternatives and similar repositories for python-ransomware
Users that are interested in python-ransomware are comparing it to the libraries listed below
Sorting:
- Simple implementation of a distributed SSH system, or botnet. Add bots to the botnet with IP address, host username, and host password. I…☆102May 12, 2020Updated 5 years ago
- Complete Python RansomeWare Source Code With Full Decoumetions.☆225Mar 11, 2023Updated 2 years ago
- Automate pwnage☆12Jul 17, 2018Updated 7 years ago
- Reverse engineering MiLight remote-controlled lightbulbs☆13May 13, 2016Updated 9 years ago
- This tool audits a website before hand and can exploit vulnerabilities if the website scanned has any.☆14Jul 3, 2013Updated 12 years ago
- AuthBypass & Auto Backdooring Devices☆15Apr 12, 2019Updated 6 years ago
- A monitoring program with sentiment analysis and prioritization.☆13Sep 22, 2018Updated 7 years ago
- A simple TLS forwarder that lets you intercept traffic and play with them.☆29Apr 29, 2019Updated 6 years ago
- agent.btz download MALWARE BINARY PROVIDED + POC video☆17Jul 11, 2021Updated 4 years ago
- Clone of Metasploit's wiki w/ additions☆17Nov 22, 2015Updated 10 years ago
- WordPress Honeypot☆35Jan 18, 2018Updated 8 years ago
- moduled sniffer TCP/UDP Proxy for man-in-the-middle attack☆16Aug 8, 2018Updated 7 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- scripts to setup pentesting system and use during pentest☆20Jun 1, 2022Updated 3 years ago
- Creates the initial scope of files and directories/folders of a web site for Spiders/Robots/Crawlers☆16Sep 8, 2013Updated 12 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated 11 months ago
- 🕵🏻📡👁🔍Analyzes all Open Wireless Networks for detect fake access points (Fingerprint)☆16Aug 13, 2018Updated 7 years ago
- A simple Python tool to harvest email addresses from Google.☆17Jan 8, 2015Updated 11 years ago
- python inspect rootkit tool☆33Oct 17, 2013Updated 12 years ago
- Simple network tools written with Scapy.☆23Mar 22, 2016Updated 9 years ago
- Attack-Defend CTF Tools☆23Oct 30, 2016Updated 9 years ago
- A simple python scanner to detect vulnerable hosts in your net☆21May 15, 2017Updated 8 years ago
- A simple, fully python ransomware PoC☆376Jun 23, 2020Updated 5 years ago
- Python Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles☆624Mar 5, 2025Updated last year
- Python Pentest Tools☆22Dec 22, 2025Updated 2 months ago
- ☆12May 13, 2020Updated 5 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆65Nov 5, 2015Updated 10 years ago
- Masking the Sethc.exe backdoor with an anti-detection system.☆29Dec 16, 2017Updated 8 years ago
- Scans packages in npm and pypi for secrets☆31Nov 4, 2019Updated 6 years ago
- Microsoft Windows HTA (HTML Application) - Remote Code Execution☆30Aug 21, 2015Updated 10 years ago
- Virus names generator☆28Feb 10, 2015Updated 11 years ago
- ☆30Aug 8, 2015Updated 10 years ago
- DDoS Script | Scanner☆27Jan 8, 2015Updated 11 years ago
- 👨💻🕵🏻👩💻 Analyze user behavior against fake access points📡☆30Jul 23, 2018Updated 7 years ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Sep 21, 2020Updated 5 years ago
- RRG / Iceman repo - Proxmark3 / Proxmark / RFID / NFC☆34Jul 13, 2023Updated 2 years ago
- Script to help with installing and configuring Metasploit Framework, Armitage and the Plugins I have written on OSX and Linux☆26Apr 29, 2013Updated 12 years ago
- ⛷ A collection of hacker scripts.☆28Jan 24, 2017Updated 9 years ago