Basic ransomware proof of concept with Python 3.7.
☆57Apr 11, 2019Updated 7 years ago
Alternatives and similar repositories for python-ransomware
Users that are interested in python-ransomware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple implementation of a distributed SSH system, or botnet. Add bots to the botnet with IP address, host username, and host password. I…☆99May 12, 2020Updated 5 years ago
- Complete Python RansomeWare Source Code With Full Decoumetions.☆225Mar 11, 2023Updated 3 years ago
- Social network feed made with Python Flask and SQLite3.☆11Apr 16, 2019Updated 6 years ago
- Cyber Threat Intelligence Appliance☆13Dec 8, 2022Updated 3 years ago
- agent.btz download MALWARE BINARY PROVIDED + POC video☆23Jul 11, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A simple Python tool to harvest email addresses from Google.☆17Jan 8, 2015Updated 11 years ago
- An open source RansomWare☆88Nov 24, 2019Updated 6 years ago
- Clone of Metasploit's wiki w/ additions☆17Nov 22, 2015Updated 10 years ago
- Pythonic ransomware proof of concept.☆219May 12, 2020Updated 5 years ago
- Bash script to show how viruses spread and to demonstrate how ransomware works.☆19Feb 14, 2023Updated 3 years ago
- dedsec is a hacking framework filled with hacking tools that you can use directly in the script☆29Nov 16, 2019Updated 6 years ago
- Automate pwnage☆12Jul 17, 2018Updated 7 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- Commands to perform various activities related to penetration testing and red teaming☆21Jan 17, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Creates the initial scope of files and directories/folders of a web site for Spiders/Robots/Crawlers☆16Sep 8, 2013Updated 12 years ago
- Python Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles☆626Mar 5, 2025Updated last year
- AuthBypass & Auto Backdooring Devices☆16Apr 12, 2019Updated 7 years ago
- A simple, fully python ransomware PoC☆377Jun 23, 2020Updated 5 years ago
- A collection of scripts for bug-bounty related stuff☆39Sep 4, 2020Updated 5 years ago
- A simple TLS forwarder that lets you intercept traffic and play with them.☆29Apr 29, 2019Updated 6 years ago
- scripts to setup pentesting system and use during pentest☆21Jun 1, 2022Updated 3 years ago
- Amazon product description generator using fine-tuned GPT-Neo — proof of concept for Texta.ai☆14Feb 15, 2026Updated last month
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆18Jan 29, 2012Updated 14 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Public exploits (re)writed while learning.☆14Aug 7, 2013Updated 12 years ago
- A simple python scanner to detect vulnerable hosts in your net☆21May 15, 2017Updated 8 years ago
- A simple framework for distributed task workflow using redis.☆32Jan 13, 2014Updated 12 years ago
- This is most dangerous botnet. No Spread needed. botnet infecting cctv,dvr etc.☆35Oct 6, 2016Updated 9 years ago
- A monitoring program with sentiment analysis and prioritization.☆13Sep 22, 2018Updated 7 years ago
- License Plate Recognition at character level☆10May 18, 2019Updated 6 years ago
- Reverse engineering MiLight remote-controlled lightbulbs☆13May 13, 2016Updated 9 years ago
- Repository for project that won 2021 CUAI Summer Conference with 3rd place Award 🥉 (Excellence Prize)☆15Aug 30, 2021Updated 4 years ago
- This tool audits a website before hand and can exploit vulnerabilities if the website scanned has any.☆14Jul 3, 2013Updated 12 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Simple tool to generate patterns and masks used to find functions in a binary without hard-coding offsets.☆14Nov 21, 2016Updated 9 years ago
- WordPress Honeypot☆35Jan 18, 2018Updated 8 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Nov 2, 2019Updated 6 years ago
- Service-Now Article Bruteforcer☆16Jun 5, 2020Updated 5 years ago
- ☆13Oct 21, 2022Updated 3 years ago
- A Linux Ransomware☆771Jan 24, 2025Updated last year
- SMS Spoofer | Graphical User Interface application☆52Mar 25, 2021Updated 5 years ago