A simple "ransomware" using powershell
☆14May 31, 2021Updated 4 years ago
Alternatives and similar repositories for Powershell-Ransomware
Users that are interested in Powershell-Ransomware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆11Aug 2, 2021Updated 4 years ago
- Python3 script that can download samples directly from Abuse.CH or via submitted URLs☆15Apr 15, 2020Updated 6 years ago
- Powershell Ransomware☆22Jan 3, 2017Updated 9 years ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- Decrypt Matrix42 Empirum /EIS Passwords☆14Mar 31, 2021Updated 5 years ago
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 7 years ago
- pour plus de tutos veuillez visiter le site☆11Sep 21, 2020Updated 5 years ago
- Original hVNC has been recoded to work with all version of windows above XP. Thanks to the original author for this wonderful tool.☆10Oct 13, 2021Updated 4 years ago
- Download and Inject code into Google Chrome extensions☆13Nov 16, 2017Updated 8 years ago
- MappingInjection via csharp☆40Nov 19, 2021Updated 4 years ago
- A open source ransomware.☆11Apr 8, 2017Updated 9 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆29Oct 30, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- D-RAT SRC Extract☆13Dec 24, 2016Updated 9 years ago
- ☆11Jan 2, 2022Updated 4 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- keylogger extension chrome, get cookie, redirection to fake web site or a nother website☆16Sep 21, 2020Updated 5 years ago
- Telegram Bot, Anonymous Message, بات تلگرام☆10May 19, 2018Updated 7 years ago
- Compiled binaries of various security tools☆15May 19, 2021Updated 4 years ago
- Collection of shellcode injection and execution techniques☆16Mar 17, 2026Updated last month
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Mar 3, 2017Updated 9 years ago
- ransomware encrypte all filles,disque C,disque D,Usb ...etc, filles can not be decrypted☆17Nov 18, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- BlackWorm SRC Extract☆16Dec 24, 2016Updated 9 years ago
- Samsung TV Denial of Service (DoS) Attack☆36Nov 18, 2016Updated 9 years ago
- Miscellaneous JScript, VBScript, WSF XML, HTA HTML, PowerShell, Batch, etc. for Windows☆15Oct 30, 2017Updated 8 years ago
- ☆20Jan 8, 2026Updated 3 months ago
- SolarWinds Orion Platform ActionPluginBaseView 反序列化RCE☆47Oct 23, 2021Updated 4 years ago
- Extract the original ransomware binary from an NSIS installer☆18Mar 22, 2017Updated 9 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆15Sep 13, 2017Updated 8 years ago
- Hax That F#uck Html Page☆10Mar 13, 2018Updated 8 years ago
- ASP.NET Core provides necessary APIs to implement secure access to an application.In this tutorial, we will see how to implement Role-Bas…☆11Aug 18, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆13Sep 22, 2022Updated 3 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆15Feb 9, 2020Updated 6 years ago
- a basic IDE compiler for C# and VB.NET using codedom☆44Sep 22, 2019Updated 6 years ago
- ☆18Nov 24, 2020Updated 5 years ago
- Runpe + DInvoke + Syscall☆16Jun 18, 2021Updated 4 years ago
- Make your Batchfiles unreadable.☆10Dec 29, 2018Updated 7 years ago
- A Patchless AMSI Bypass Technique using VEH²☆32Jun 22, 2025Updated 10 months ago