A simple android ransomeware tool built in python
☆18Jun 27, 2021Updated 4 years ago
Alternatives and similar repositories for AndroidRansome
Users that are interested in AndroidRansome are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Discover the fastest software that clones 8x what other cloners can. Experience seamless clones and undetected rewrites with 100% accurac…☆16Aug 4, 2023Updated 2 years ago
- Divulge Stealer a highly advanced info-stealer that outperforms its predecessor, Umbral-Stealer by Blank-c. This new iteration is a compl…☆21Jan 7, 2025Updated last year
- ☆21Aug 3, 2021Updated 4 years ago
- A simple python script for finding information about a number plate☆21May 24, 2021Updated 4 years ago
- Advanced Keylogger / Info Grabber written in C++.☆33Mar 23, 2025Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Cool HackerOne Reports☆22Nov 16, 2022Updated 3 years ago
- A production-grade, single codebase cross-platform UI framework with reactive signals, streaming SSR, and GPU rendering.☆63Feb 19, 2026Updated 2 months ago
- emailosint is a tool for gathering email accounts informations (ip,hostname,country, etc...)☆22May 25, 2021Updated 4 years ago
- ANDROID BOTNET | ANDROID RAT | EASY TO USE | EASY TO CONTROL | WITHOUT ROOT | REMOTELY CONTROL ANDROID 2022☆309May 9, 2022Updated 3 years ago
- Facebook Hacking Menu☆39Apr 25, 2020Updated 6 years ago
- Juice Jacking / Automatic Android Rooting based on Intel Edison using dirty c0w☆11Nov 16, 2016Updated 9 years ago
- A python based tool for exploiting and managing android devices via ADB☆35May 15, 2021Updated 4 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆18Mar 25, 2023Updated 3 years ago
- Install popular tools used while pentesting & playing labs☆14Oct 8, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- The Magisk Module implementation of the ChArch script.☆14Apr 3, 2022Updated 4 years ago
- Read & write magnetic card data to magspoof (ATtiny85)☆12May 27, 2019Updated 6 years ago
- Exploit toolkit☆58Jul 24, 2021Updated 4 years ago
- RuneScape Development Kit☆20Jun 18, 2011Updated 14 years ago
- ATM Configurator aka Tyupkin trojan☆11Mar 23, 2015Updated 11 years ago
- Interactive hacking toolkit.☆14Oct 17, 2018Updated 7 years ago
- Properly Engineered Infection Kit, A framework for creating malware in C#. Multi-threaded, comes with a built-in MSIL obfuscator and pack…☆15Jun 30, 2011Updated 14 years ago
- Bot for Runescape NXT client (non functional currently)☆12Mar 23, 2021Updated 5 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆15Jan 25, 2025Updated last year
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- ☆12Oct 20, 2018Updated 7 years ago
- Code and notes regarding Malware Development☆11Oct 30, 2022Updated 3 years ago
- Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?☆14Aug 24, 2022Updated 3 years ago
- List of some really cool websites☆12Mar 14, 2026Updated last month
- How to Get Free Coins and Keys in Arcana OCTOBER 12, 2018 LENCIPETA UNCATEGORIZED How to cheat in The Arcana: A Mystic Romance on iOS/An…☆14Feb 15, 2019Updated 7 years ago
- Nexus of Android banking Trojans☆14Oct 11, 2023Updated 2 years ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- Deploy to Vercel with GitHub Actions☆21Updated this week
- Unlock FRP MediaTek devices☆11Jan 6, 2024Updated 2 years ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- ESP8266 Based WiFi Deauther with more features (like: WebConsole, WebConverter)☆10Jan 3, 2023Updated 3 years ago