A simple PoC crypto ransomware in Python
☆19Jul 31, 2016Updated 9 years ago
Alternatives and similar repositories for RansPy
Users that are interested in RansPy are comparing it to the libraries listed below
Sorting:
- A ransomware implementation just for educational purpose☆15May 27, 2017Updated 8 years ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Jan 28, 2024Updated 2 years ago
- Indirect Syscall invocation via thread hijacking☆26May 5, 2023Updated 2 years ago
- Shellcode loader based on indirect syscall☆22Feb 9, 2025Updated last year
- LSTAR - CobaltStrike Translated to EN☆22Jun 15, 2023Updated 2 years ago
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager☆23Jan 4, 2025Updated last year
- Labs setup for tests & experimentations☆25Aug 30, 2021Updated 4 years ago
- Small collection of Active Directory pentesting tools.☆32Jan 29, 2024Updated 2 years ago
- Telegram Bot in Python☆22Oct 30, 2018Updated 7 years ago
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆36Dec 1, 2025Updated 3 months ago
- This bot allows you to automate the download process from a page where links to download files are periodically added☆10Dec 16, 2019Updated 6 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- NTLM Hash Generator☆10Apr 2, 2021Updated 4 years ago
- Telegram scraper for Maltego, allows from an Alias entity to find all forwarded accounts☆11Apr 25, 2023Updated 2 years ago
- monerobux modules for sopel irc bot☆11Aug 24, 2021Updated 4 years ago
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.☆10Apr 8, 2024Updated last year
- Python scripts for easy and anonymous cam4 recordings.☆10Mar 18, 2024Updated last year
- NTAPI hook bypass with (semi) legit stack trace☆19May 9, 2023Updated 2 years ago
- mp4 video download from Vimeo and DailyMotion☆10Apr 4, 2017Updated 8 years ago
- IoT CVEs as abnormal events to evaluate a real-time host-based IDS. https://doi.org/10.1016/j.future.2022.03.001☆13Mar 16, 2022Updated 3 years ago
- JustGetDA, a cheat sheet which will aid you through internal network & red team engagements.☆13Jul 24, 2023Updated 2 years ago
- Hacking resources for the Exegol project☆42Feb 1, 2026Updated last month
- ☆16Jun 15, 2025Updated 8 months ago
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- ☆13Feb 25, 2023Updated 3 years ago
- Some security by obscurity using port-jumping.☆14Aug 21, 2025Updated 6 months ago
- A collection of tools, documents, articles, blog posts, interviews, videos and many others!☆14Oct 10, 2024Updated last year
- HTB Jail Remote Exploit By Cneeliz - 2017☆15Jan 9, 2018Updated 8 years ago
- EQGRP: Replicating DarkPulsar, an DLL capable of hooking Security Package Method Tables on the Heap!☆10Oct 11, 2020Updated 5 years ago
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- Detect VM and Hypervisor☆10Jun 16, 2021Updated 4 years ago
- Companion Worm research☆16Nov 8, 2021Updated 4 years ago
- Pentest tool com foco em teste de intrusão em redes wireless para Windows☆12Dec 24, 2019Updated 6 years ago
- Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum…☆17Jun 12, 2025Updated 8 months ago
- Performance hacks and some hotfixes for YOOtheme ZOO Joomla! Component☆11Oct 2, 2018Updated 7 years ago
- [Forked] This repo is for learning various heap exploitation techniques.☆10Sep 6, 2018Updated 7 years ago
- LibSSH Authentication Bypass Exploit using RCE☆11Oct 25, 2018Updated 7 years ago
- OSCP preparation☆12Sep 18, 2025Updated 5 months ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago