nemuelw / ZamokLinks
FUD Linux Ransomware
☆14Updated 2 years ago
Alternatives and similar repositories for Zamok
Users that are interested in Zamok are comparing it to the libraries listed below
Sorting:
- A simple windows ransomware simulator that will rename .TXT files a ransomware extension to simulate ransomware behavior for testing vari…☆87Updated 4 years ago
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆77Updated last year
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆98Updated 9 months ago
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆50Updated 2 years ago
- Ransomware Simulator for Blue team ,Ransomware Simulator for Red team ,Ransomware infographic, open source Anti Ransomware, Ransomware As…☆35Updated 4 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆27Updated last year
- ☆18Updated 4 years ago
- Well, I have created this shit for educational pruposes (I think)☆36Updated 3 years ago
- Capture screenshots of onion services on an onion service.☆70Updated last year
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆87Updated last year
- The LockBit builder files☆125Updated last year
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated last year
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago
- ☆17Updated 3 years ago
- RansomwareSim is a simulated ransomware☆157Updated last year
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆58Updated 2 years ago
- Windows And Ways To Break It☆99Updated last year
- NetProbe: Network Probe☆162Updated 10 months ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆69Updated 4 months ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Updated 3 years ago
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆37Updated 2 months ago
- [EN] BETA: Layla - recon tool for bug bounty☆76Updated 3 years ago
- A Ransomware Based in AES256 Algorithm☆17Updated 3 years ago
- A high-risk archive of historical malware, exploit kits, crypters, and webshells for educational and cybersecurity research purposes. Non…☆67Updated 6 months ago
- ☆25Updated 2 years ago
- Crawls URL to get a better image of what is tied to a website.☆33Updated 2 years ago
- List of Awesome Red Teaming Resources☆13Updated 3 years ago
- Red Team Guides☆139Updated last year
- Just some lists of Malware Configs☆172Updated 7 months ago
- Strumenti di Acquisizione e Analisi di copie Forensi☆157Updated last year