FUD Linux Ransomware
☆14Jan 12, 2023Updated 3 years ago
Alternatives and similar repositories for Zamok
Users that are interested in Zamok are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ransonware simples, criptografa arquivos e volta ao normal com a chave fornecida☆10Jan 28, 2021Updated 5 years ago
- ☆10Feb 15, 2023Updated 3 years ago
- A network logging tool that logs per process activities☆32Jun 13, 2023Updated 2 years ago
- Nmap NSE scripts☆28Feb 1, 2022Updated 4 years ago
- A Python script to parse Fortinet products serial numbers, and detect the associated model and revision.☆19Oct 1, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Fairly Undetectable Linux Spyware☆18Mar 1, 2023Updated 3 years ago
- Muteces (mutexes/mutants) used by various malware families☆23Nov 11, 2024Updated last year
- Operative Systems Suported are: Linux-ubuntu, kali-linux, backtack-linux (un-continued), freeBSD, Mac osx (un-continued) Netool its a to…☆31Jul 6, 2017Updated 8 years ago
- FUD Linux Remote Access Trojan☆19Nov 18, 2022Updated 3 years ago
- Conti Ransomware malware leak WITH LOCKER☆25Mar 5, 2022Updated 4 years ago
- ProgramCMS is a complete, trustworthy CMS & easy to use PHP Framework to build and deploy All kind of Web Sites. Please note that Program…☆18Apr 30, 2025Updated 11 months ago
- E-mails, subdomains and names Harvester - OSINT☆11Jan 17, 2020Updated 6 years ago
- Decompress, Extract, Repack and Compress RARC archives with Yaz0 compression.☆13Mar 31, 2020Updated 6 years ago
- Tools and resources that may be useful to you when conducting investigations related to Islamic Republic of Iran☆22Sep 10, 2025Updated 7 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ENTERPRISE LAB PROJECTS☆10Dec 24, 2024Updated last year
- ☆60Jun 24, 2023Updated 2 years ago
- A curated malware database with more then +73000 samples.☆19Feb 20, 2021Updated 5 years ago
- Collaborative malware exchange repository.☆34Nov 21, 2024Updated last year
- OSINT oriented Web Browser☆17Apr 7, 2026Updated last week
- scripts to automate configuration tasks in Fortigate☆10May 1, 2015Updated 10 years ago
- ☆28Feb 7, 2021Updated 5 years ago
- Protocol Designer allows you to design network protocols interactively.☆16Apr 12, 2026Updated last week
- Report Renderer for Dynamics 365☆57May 11, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Ransomware Decryptors☆35Apr 28, 2022Updated 3 years ago
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Mar 20, 2025Updated last year
- Open Database Hunting - Finding potential breaches.☆10Feb 2, 2022Updated 4 years ago
- automating the zig release process☆11Nov 19, 2025Updated 5 months ago
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆65Aug 30, 2022Updated 3 years ago
- Stories from the top engineering blogs in one place.☆17Jul 5, 2022Updated 3 years ago
- Curated list of enterprise ransomware defense resources