nemuelw / Zamok
FUD Linux Ransomware
☆13Updated 2 years ago
Alternatives and similar repositories for Zamok:
Users that are interested in Zamok are comparing it to the libraries listed below
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆56Updated last year
- ☆14Updated 2 years ago
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆95Updated 4 months ago
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆74Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆23Updated 2 years ago
- Hacking with PasteJacking technique☆21Updated 8 months ago
- Sifter - All purpose penetration testing op-center☆74Updated 2 years ago
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- Crawls URL to get a better image of what is tied to a website.☆32Updated last year
- Ransonware simples, criptografa arquivos e volta ao normal com a chave fornecida☆9Updated 4 years ago
- steal chrome saved passwords "undetectable"☆49Updated 3 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆58Updated last year
- A C2 framework built for my bachelors thesis☆55Updated 4 months ago
- Capture screenshots of onion services on an onion service.☆48Updated 9 months ago
- ☆15Updated 2 years ago
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆13Updated 2 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆18Updated last year
- Hide an IP address in scripts using hex/decimal/octal conversions☆66Updated last year
- quick and dirty proof-of-concept to hide shells in images☆49Updated 8 months ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆22Updated 7 months ago
- Bash Script to automate the process of setting up a new Kali Linux virtual machine to look a like HTB PwnBox☆18Updated 2 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆85Updated 7 months ago
- ☆36Updated 2 months ago
- 🎞 lan and wifi interception. Gnu/Linux Version☆16Updated 4 years ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆75Updated last year
- What is Phone Track? So phonetrack is a type of OSINT that is used to track someone's location just based on their telephone number☆71Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆35Updated last year
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆133Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year
- Generate FUD Droppers that are undetectable by popular AV's☆31Updated last year