Basic ransomware proof of concept with Python 3.7.
☆57Apr 11, 2019Updated 6 years ago
Alternatives and similar repositories for python-ransomware
Users that are interested in python-ransomware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple implementation of a distributed SSH system, or botnet. Add bots to the botnet with IP address, host username, and host password. I…☆102May 12, 2020Updated 5 years ago
- agent.btz download MALWARE BINARY PROVIDED + POC video☆21Jul 11, 2021Updated 4 years ago
- A simple Python tool to harvest email addresses from Google.☆17Jan 8, 2015Updated 11 years ago
- An open source RansomWare☆88Nov 24, 2019Updated 6 years ago
- Clone of Metasploit's wiki w/ additions☆17Nov 22, 2015Updated 10 years ago
- Bash script to show how viruses spread and to demonstrate how ransomware works.☆19Feb 14, 2023Updated 3 years ago
- Pythonic ransomware proof of concept.☆219May 12, 2020Updated 5 years ago
- Automate pwnage☆12Jul 17, 2018Updated 7 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- Python Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles☆625Mar 5, 2025Updated last year
- AuthBypass & Auto Backdooring Devices☆15Apr 12, 2019Updated 6 years ago
- A collection of scripts for bug-bounty related stuff☆39Sep 4, 2020Updated 5 years ago
- scripts to setup pentesting system and use during pentest☆20Jun 1, 2022Updated 3 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Jan 29, 2012Updated 14 years ago
- Public exploits (re)writed while learning.☆14Aug 7, 2013Updated 12 years ago
- A simple python scanner to detect vulnerable hosts in your net☆21May 15, 2017Updated 8 years ago
- Python tool for exploiting CVE-2021-35616☆11Dec 3, 2021Updated 4 years ago
- +300 TOOLS in 1! IN ITALIANO☆15Nov 15, 2022Updated 3 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- This is most dangerous botnet. No Spread needed. botnet infecting cctv,dvr etc.☆34Oct 6, 2016Updated 9 years ago
- ☆12Oct 9, 2022Updated 3 years ago
- A monitoring program with sentiment analysis and prioritization.☆13Sep 22, 2018Updated 7 years ago
- Reverse engineering MiLight remote-controlled lightbulbs☆13May 13, 2016Updated 9 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆11Sep 2, 2020Updated 5 years ago
- my fork of libxml2☆11May 11, 2011Updated 14 years ago
- This tool audits a website before hand and can exploit vulnerabilities if the website scanned has any.☆14Jul 3, 2013Updated 12 years ago
- Simple tool to generate patterns and masks used to find functions in a binary without hard-coding offsets.☆13Nov 21, 2016Updated 9 years ago
- Service-Now Article Bruteforcer☆16Jun 5, 2020Updated 5 years ago
- ☆13Oct 21, 2022Updated 3 years ago
- A Linux Ransomware☆768Jan 24, 2025Updated last year
- SMS Spoofer | Graphical User Interface application☆52Mar 25, 2021Updated 4 years ago
- 🕵🏻📡👁🔍Analyzes all Open Wireless Networks for detect fake access points (Fingerprint)☆16Aug 13, 2018Updated 7 years ago
- How to use the opencorporates API☆11Apr 2, 2018Updated 7 years ago
- General tools and scripts i want to make public to the world.☆46Apr 14, 2019Updated 6 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- An Python Script For Generating Payloads that Bypasses All Antivirus so far .☆1,003Jan 19, 2024Updated 2 years ago
- TLD records archive. Revisiting the original TLDR project by mandatoryprogrammer, on the hunt for more root nameserver changes.☆11Dec 4, 2022Updated 3 years ago
- ☆10Oct 11, 2020Updated 5 years ago
- Mass deface's 1500 website☆16Feb 8, 2023Updated 3 years ago