nemuelw / Zamok
FUD Linux Ransomware
☆13Updated 2 years ago
Alternatives and similar repositories for Zamok:
Users that are interested in Zamok are comparing it to the libraries listed below
- Hacking with PasteJacking technique☆22Updated 9 months ago
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆47Updated 2 years ago
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆13Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆23Updated 2 years ago
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- Code injection is a technique where a process can insert a part of or all of its code from its own running process into another target pr…☆14Updated last year
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆85Updated 9 months ago
- Ransomware Simulator for Blue team ,Ransomware Simulator for Red team ,Ransomware infographic, open source Anti Ransomware, Ransomware As…☆33Updated 3 years ago
- Ransonware simples, criptografa arquivos e volta ao normal com a chave fornecida☆9Updated 4 years ago
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆97Updated 6 months ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆22Updated 9 months ago
- OSINT tool for username, email and domains☆28Updated 11 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆63Updated last year
- A network logging tool that logs per process activities☆32Updated last year
- Fuxsociety Mr Robot 2.1☆27Updated last year
- Capture screenshots of onion services on an onion service.☆48Updated 10 months ago
- Extendable Python script handler for automating penetration testing.☆39Updated 2 years ago
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆74Updated last year
- An open-source .NET Ransomware☆24Updated 3 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 2 years ago
- ☆38Updated 4 months ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆16Updated 8 months ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆60Updated 3 years ago
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆54Updated 2 years ago
- Python-based web scraper for a darkweb marketplace on the Tor network.☆30Updated 7 months ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- Well, I have created this shit for educational pruposes (I think)☆35Updated 2 years ago
- ☆14Updated 2 years ago