A ransomware developed in python, with bypass technics, for educational purposes.
☆66Dec 10, 2021Updated 4 years ago
Alternatives and similar repositories for DeathRansom
Users that are interested in DeathRansom are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Malwares are here☆26Jan 16, 2025Updated last year
- Download a Bunch of Malware for Demos and Testing☆13Sep 28, 2018Updated 7 years ago
- Wi-Fi Exploit Tool☆50May 23, 2020Updated 5 years ago
- Complete Python RansomeWare Source Code With Full Decoumetions.☆224Mar 11, 2023Updated 3 years ago
- Tiny read-only unlocker for MS Office documents☆12Aug 18, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Methods of C2☆22Jul 15, 2015Updated 10 years ago
- ☆13Sep 26, 2020Updated 5 years ago
- Peap Bomb is a password sprayer for WPA/WPA2 enterprise wireless that is leveraging PEAP for Authentication.☆10Feb 18, 2021Updated 5 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆29Apr 25, 2022Updated 4 years ago
- USB rubber ducky 2.O, A simple programmes which stole victim sensitive data by USB in one click & bypass firewall & defender.☆11Apr 21, 2021Updated 5 years ago
- 1secmail disposable temp mail service from terminal☆12Dec 5, 2022Updated 3 years ago
- This is the published source code from the Worm Locker2.0 ransomware. Please open the README file in a zip file for more information.☆14Dec 18, 2020Updated 5 years ago
- fully Undetectable payload generator for metasploit☆11Feb 1, 2023Updated 3 years ago
- Keylogger that sends Email at a specific time☆10Apr 7, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Cryptowall Ransomware from Mr Robot serie S2E1 and S2E2☆32May 7, 2024Updated last year
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Apr 16, 2021Updated 5 years ago
- Source code of the SLocker Android ransomware☆61Jul 22, 2017Updated 8 years ago
- Portfolio Website of Mukkamala Venkata Sai Prakash Created by Program Warehouse☆18Dec 28, 2020Updated 5 years ago
- converts EXE (or other binary) files to VBS scripts☆24Oct 15, 2012Updated 13 years ago
- 🛠️ Simple EXE-File Pumper, written in C#☆17Nov 7, 2020Updated 5 years ago
- hacklock is a bash based script which is officially termux from this tool in just one click you can generate pattern phishing tool which …☆15Aug 25, 2020Updated 5 years ago
- A small example of an assembly bootloader☆11Jun 29, 2021Updated 4 years ago
- Simple python script to evade antiviruses on fully patched and updated Windows environments using a py2exe.☆20Oct 24, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Script to monitor pastebin.com's public pastes for sensitive data leakage☆31Dec 2, 2020Updated 5 years ago
- Keylogger for ethical hackers☆14Aug 25, 2021Updated 4 years ago
- ☆15Jul 18, 2023Updated 2 years ago
- A chat application that can ecnrypt messages with remote user's public Key and decrypt messages with local user's private Key☆11Jan 14, 2020Updated 6 years ago
- A script to automatically dump all URLs present in /server-status to a file locally.☆24Feb 11, 2025Updated last year
- Revisiting a classic tool, the file pumper! 💦☆15Apr 16, 2020Updated 6 years ago
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆16Mar 21, 2026Updated last month
- This is a python program backdoor embeded with a game for reverse connection from the victim to understand the use visit our youtube chan…☆11Dec 20, 2021Updated 4 years ago
- Twitter Bot to perform advanced search and automated response☆13Dec 22, 2017Updated 8 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Notes about reverse engineering the Petya2017 ransomware☆20Jul 6, 2017Updated 8 years ago
- CryptoWall 3.0 Ransomware Reversing Documentation & Scripts☆17Nov 24, 2020Updated 5 years ago
- 🔅 Reverse shell written on python3☆14Dec 12, 2020Updated 5 years ago
- phishfactory offers a variety of email templates for spear-phishing attacks. [more templates to still be added]☆19Jan 4, 2021Updated 5 years ago
- A browser based bitcoin miner☆16Dec 15, 2013Updated 12 years ago
- Convert Any Exe to Bin (Base64 Output or Binary)☆21Jun 19, 2020Updated 5 years ago
- Application for cracking Red Petya key based on genetic algorithms.☆56Apr 14, 2022Updated 4 years ago