nemuelw / ZamokLinks
FUD Linux Ransomware
☆14Updated 2 years ago
Alternatives and similar repositories for Zamok
Users that are interested in Zamok are comparing it to the libraries listed below
Sorting:
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆75Updated last year
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆51Updated 2 years ago
- A multi web security purposes tool☆39Updated last month
- PowerSploit - A PowerShell Post-Exploitation Framework☆23Updated 3 years ago
- Malware Libraries focused in help Malware Development☆23Updated 2 years ago
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆58Updated 2 years ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆70Updated 2 years ago
- Capture screenshots of onion services on an onion service.☆49Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- Ransomware Simulator for Blue team ,Ransomware Simulator for Red team ,Ransomware infographic, open source Anti Ransomware, Ransomware As…☆35Updated 3 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated 11 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- Code injection is a technique where a process can insert a part of or all of its code from its own running process into another target pr…☆14Updated 2 years ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆136Updated last year
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆98Updated 8 months ago
- Ransonware simples, criptografa arquivos e volta ao normal com a chave fornecida☆10Updated 4 years ago
- Hacking with PasteJacking technique☆22Updated 11 months ago
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆63Updated 2 years ago
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆36Updated 3 weeks ago
- ☆15Updated 3 years ago
- Strumenti di Acquisizione e Analisi di copie Forensi☆153Updated last year
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆46Updated 11 months ago
- This project is a tool for detecting nudity in images, allowing users to analyze both local images and images from URLs. It utilizes the …☆12Updated 9 months ago
- Red Teaming Tactics and Techniques☆14Updated 3 years ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆63Updated last year
- Sifter - All purpose penetration testing op-center☆76Updated 2 years ago
- Crawls URL to get a better image of what is tied to a website.☆33Updated last year
- Fuxsociety Mr Robot 2.1☆27Updated 2 years ago
- ☆40Updated 6 months ago
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago