A list of bitcoin addresses being used in Ransomware and Sextortion Scams
☆18Jul 4, 2021Updated 4 years ago
Alternatives and similar repositories for Badd-Boyz-Bitcoin-Scammers
Users that are interested in Badd-Boyz-Bitcoin-Scammers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- How to get Travis CI to test Apache code including vhosts and custom apache code like .htaccess rules or other scripts you have written a…☆12Apr 4, 2017Updated 9 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- Personal AI assistant via Telegram, powered by Qwen Code (free, 1000 req/day). One-line installer.☆53Apr 19, 2026Updated 2 weeks ago
- A dataset of various malicious cryptocurrency-related URLs and Twitter profiles☆58Apr 29, 2023Updated 3 years ago
- Qt5 rsync front-end☆11Sep 14, 2017Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- Simple yet Powerfull Sapi 4/5 TTS Reader☆14Mar 24, 2019Updated 7 years ago
- Scripts for OSCE☆18Dec 28, 2018Updated 7 years ago
- TOTP (Time-based One-Time Password) authentication for Django REST Framework.☆14Feb 5, 2026Updated 3 months ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- Bitcoin signature tool☆16Feb 14, 2021Updated 5 years ago
- ☆26Nov 14, 2017Updated 8 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- ☆17Feb 15, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆15Aug 23, 2024Updated last year
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- Open Database Hunting - Finding potential breaches.☆10Feb 2, 2022Updated 4 years ago
- Tiny collection of programs used for ECDSA (keygen, sign, verify)☆16Sep 13, 2025Updated 7 months ago
- Detect CI Environment from environment variables☆13May 2, 2026Updated last week
- Criteria for evaluating Bitcoin wallets' privacy properties.☆49Jul 7, 2016Updated 9 years ago
- ☆13Apr 11, 2022Updated 4 years ago
- a password store based on age-encryption☆33Sep 22, 2023Updated 2 years ago
- Stories from the top engineering blogs in one place.☆17Jul 5, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 6 years ago
- The code implements ransomware-like behavior, encrypting files by changing their extensions to "k3vil." It includes a decryption process …☆22May 23, 2024Updated last year
- Post the latest post from your RSS Feed to your LinkedIn Profile☆14Jan 28, 2026Updated 3 months ago
- Convert text to Speech☆11Jan 25, 2019Updated 7 years ago
- A self-hosted project template for a blog website using Laravel Livewire☆10Jun 6, 2023Updated 2 years ago
- A poc to demonstrate how ransomware can spread to enterprise apps through libraries☆11Mar 28, 2018Updated 8 years ago
- Encryption using 2 Factor Authentication through an external drive with Python☆12Jun 7, 2020Updated 5 years ago
- Expand CIDR ranges to IPv4 addresses☆13Jul 28, 2022Updated 3 years ago
- A python library to access the ARD Audiothek API☆13Mar 30, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- audacity plugin list☆13Dec 16, 2017Updated 8 years ago
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Mar 3, 2017Updated 9 years ago
- Miscellaneous old Exploit code and PoCs☆16Oct 1, 2024Updated last year
- List of papers, datasets and other resources related to Machine Comprehension☆12Jul 22, 2017Updated 8 years ago
- bitfwd's Ethereum Ropsten Faucet☆12Jun 4, 2018Updated 7 years ago
- Repository for contracts supporting bridge between Flow <> EVM☆13Apr 16, 2026Updated 3 weeks ago
- ☆20Jun 24, 2017Updated 8 years ago