nemuelw / ZamokLinks
FUD Linux Ransomware
☆14Updated 2 years ago
Alternatives and similar repositories for Zamok
Users that are interested in Zamok are comparing it to the libraries listed below
Sorting:
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆77Updated last year
- A simple windows ransomware simulator that will rename .TXT files a ransomware extension to simulate ransomware behavior for testing vari…☆90Updated 4 years ago
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆51Updated 2 years ago
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆98Updated 8 months ago
- Well, I have created this shit for educational pruposes (I think)☆36Updated 2 years ago
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆261Updated 4 years ago
- ☆122Updated last year
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆58Updated 2 years ago
- Ransomware Simulator for Blue team ,Ransomware Simulator for Red team ,Ransomware infographic, open source Anti Ransomware, Ransomware As…☆35Updated 4 years ago
- BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender res…☆31Updated last year
- Windows And Ways To Break It☆100Updated last year
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆113Updated last year
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated last year
- ⚠️ Malware Development training ⚠️☆32Updated 4 months ago
- C2 server to connect to a victim machine via reverse shell☆54Updated 3 years ago
- This repository contains a few leaked files of HookBot.☆104Updated last year
- This repository contains a collection of code examples and tutorials for programming in x86 assembly language☆31Updated last month
- Capture screenshots of onion services on an onion service.☆49Updated last year
- RansomwareSim is a simulated ransomware☆159Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆23Updated 3 years ago
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆36Updated last month
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆33Updated 3 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆87Updated 11 months ago
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Updated 10 months ago
- Sifter - All purpose penetration testing op-center☆76Updated 2 years ago
- List of Awesome Red Teaming Resources☆13Updated 3 years ago
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆62Updated 3 years ago
- Ded Security Framework is a tool aimed at security professionals☆35Updated last year
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆70Updated 2 years ago