FUD Linux Ransomware
☆14Jan 12, 2023Updated 3 years ago
Alternatives and similar repositories for Zamok
Users that are interested in Zamok are comparing it to the libraries listed below
Sorting:
- ☆10Feb 15, 2023Updated 3 years ago
- This project provides insights into how ransomware operates without the need to install any applications.☆27Sep 23, 2023Updated 2 years ago
- FUD Linux Remote Access Trojan☆18Nov 18, 2022Updated 3 years ago
- Muteces (mutexes/mutants) used by various malware families☆23Nov 11, 2024Updated last year
- A Linux/Windows Ransomware PoC written in Python, Go and C☆16Jun 17, 2023Updated 2 years ago
- A Python script to parse Fortinet products serial numbers, and detect the associated model and revision.☆19Oct 1, 2023Updated 2 years ago
- Conti Ransomware malware leak WITH LOCKER☆24Mar 5, 2022Updated 4 years ago
- A curated malware database with more then +73000 samples.☆19Feb 20, 2021Updated 5 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Apr 9, 2021Updated 4 years ago
- ☆12Oct 10, 2023Updated 2 years ago
- A malware researching repository.☆21Aug 10, 2021Updated 4 years ago
- A collection of digital forensics tools for verification, investigations, diagnostics, software, libraries, learning tutorials, framework…☆33Aug 26, 2022Updated 3 years ago
- ☆28Feb 7, 2021Updated 5 years ago
- ProgramCMS is a complete, trustworthy CMS & easy to use PHP Framework to build and deploy All kind of Web Sites. Please note that Program…☆18Apr 30, 2025Updated 10 months ago
- Collaborative malware exchange repository.☆34Nov 21, 2024Updated last year
- ☆35Sep 25, 2020Updated 5 years ago
- Operative Systems Suported are: Linux-ubuntu, kali-linux, backtack-linux (un-continued), freeBSD, Mac osx (un-continued) Netool its a to…☆31Jul 6, 2017Updated 8 years ago
- USB Ransomware, will encrypt SOME files and steal some, you can change what it steals.☆36Apr 22, 2024Updated last year
- Predict Students Dropout and Academic Success Using Machine Learning Algorithms☆12Jan 23, 2024Updated 2 years ago
- ENTERPRISE LAB PROJECTS☆10Dec 24, 2024Updated last year
- A command line tic-tac-toe game in Golang☆12Oct 14, 2024Updated last year
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆79Jan 13, 2024Updated 2 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Oct 28, 2019Updated 6 years ago
- This is our internal Team Progress Tracker for the 100days of hacking☆33Jun 21, 2021Updated 4 years ago
- Quick analysis focusing on most important of a Malware or a Threat☆38Sep 4, 2023Updated 2 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- ☆12Oct 28, 2022Updated 3 years ago
- ☆12Sep 17, 2023Updated 2 years ago
- Solutions to Problems from the Hackerrank Math 🧮 Domain.☆13Aug 4, 2022Updated 3 years ago
- Public open-source code of malware Shamoon (aka Disttrack).☆36May 28, 2015Updated 10 years ago
- A Linux Cyptomining malware☆38May 5, 2023Updated 2 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- ☆16Aug 19, 2024Updated last year
- Data Availability Light Client for Celestia☆13May 23, 2022Updated 3 years ago
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- Encryption using 2 Factor Authentication through an external drive with Python☆12Jun 7, 2020Updated 5 years ago
- E-mails, subdomains and names Harvester - OSINT☆11Jan 17, 2020Updated 6 years ago
- Open Database Hunting - Finding potential breaches.☆10Feb 2, 2022Updated 4 years ago