nemuelw / ZamokLinks
FUD Linux Ransomware
☆14Updated 2 years ago
Alternatives and similar repositories for Zamok
Users that are interested in Zamok are comparing it to the libraries listed below
Sorting:
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆59Updated 2 years ago
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆78Updated last year
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Updated 11 months ago
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆51Updated 2 years ago
- Windows And Ways To Break It☆99Updated last year
- ☆17Updated 3 years ago
- ☆19Updated 4 years ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆71Updated 4 months ago
- Well, I have created this shit for educational pruposes (I think)☆37Updated 3 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆87Updated last year
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆116Updated last year
- Ransomware Simulator for Blue team ,Ransomware Simulator for Red team ,Ransomware infographic, open source Anti Ransomware, Ransomware As…☆35Updated 4 years ago
- 🎞 lan and wifi interception. Gnu/Linux Version☆17Updated 4 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆27Updated last year
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆37Updated 2 months ago
- A simple windows ransomware simulator that will rename .TXT files a ransomware extension to simulate ransomware behavior for testing vari…☆90Updated 4 years ago
- [EN] BETA: Layla - recon tool for bug bounty☆76Updated 3 years ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆70Updated 2 years ago
- An open-source .NET Ransomware☆26Updated 4 years ago
- ☆123Updated last year
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆63Updated 3 years ago
- BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender res…☆32Updated last year
- Curated list of enterprise ransomware defense resources☆14Updated 3 years ago
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆54Updated 3 years ago
- alfa shell, alfa shell download, alfa shell txt, alfashell, alfa webshell☆14Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Capture screenshots of onion services on an onion service.☆71Updated last year
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆138Updated 3 years ago
- VLAN attacks toolkit☆14Updated 3 years ago
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago