nemuelw / ZamokLinks
FUD Linux Ransomware
☆14Updated 2 years ago
Alternatives and similar repositories for Zamok
Users that are interested in Zamok are comparing it to the libraries listed below
Sorting:
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆51Updated 2 years ago
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆79Updated last year
- A simple windows ransomware simulator that will rename .TXT files a ransomware extension to simulate ransomware behavior for testing vari…☆90Updated 4 years ago
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆59Updated 2 years ago
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆102Updated 11 months ago
- Ransomware Simulator for Blue team ,Ransomware Simulator for Red team ,Ransomware infographic, open source Anti Ransomware, Ransomware As…☆36Updated 4 years ago
- Well, I have created this shit for educational pruposes (I think)☆37Updated 3 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 4 years ago
- FUD Linux Remote Access Trojan☆17Updated 2 years ago
- List of some cybersecurity conferences☆57Updated last month
- Strumenti di Acquisizione e Analisi di copie Forensi☆169Updated last month
- Notes for red teamers - from cloud to Active Directory to many things in between.☆60Updated last year
- BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender res…☆33Updated last year
- This repository contains a few leaked files of HookBot.☆106Updated 2 years ago
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago
- Capture screenshots of onion services on an onion service.☆71Updated last year
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆64Updated 3 years ago
- ☆25Updated 2 years ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆116Updated last year
- Extendable Python script handler for automating penetration testing.☆40Updated 2 years ago
- Sifter - All purpose penetration testing op-center☆81Updated 2 years ago
- TryHackMe challenges☆30Updated last year
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆139Updated 2 years ago
- A curated list of tools useful within the field of cyber security, for both blue and red team operations.☆97Updated 9 months ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆42Updated 3 years ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆64Updated last year
- ☆123Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Updated last year
- Remote persistent 🔑Logger for Windows and Linux☆296Updated 2 years ago