A proof-of-concept for ransomware encryption
☆19Nov 29, 2025Updated 5 months ago
Alternatives and similar repositories for ransomware-demo
Users that are interested in ransomware-demo are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Sise supplicant exploit kit -- 华软蝴蝶漏洞利用工具包..☆14Mar 11, 2016Updated 10 years ago
- movie to animation gif converter☆61Feb 18, 2013Updated 13 years ago
- ☆26Nov 4, 2015Updated 10 years ago
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated 2 years ago
- A project to learn about malware and c++ coding☆23Sep 5, 2015Updated 10 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Research on the various credentials databases that have been dumped.☆11Jan 31, 2018Updated 8 years ago
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Nov 28, 2017Updated 8 years ago
- Windows PE file debugger☆11Aug 30, 2017Updated 8 years ago
- Windows Optimizer☆27Dec 25, 2012Updated 13 years ago
- Windows priviledge escalation script☆13Feb 1, 2025Updated last year
- A fast and advanced ransomware PoC☆60Aug 24, 2015Updated 10 years ago
- This Python script takes a hexadecimal string of digital binary data (from the two tracks of a debit card barcode) and obtains serial, ac…☆12Aug 4, 2020Updated 5 years ago
- Windows Kernel Mode PCRE☆10Feb 4, 2015Updated 11 years ago
- ☆10Jun 1, 2014Updated 11 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- bmod parses binaries for modification/patching and disassembles machine code sections.☆12Apr 19, 2018Updated 8 years ago
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆27May 14, 2016Updated 10 years ago
- libdft for win☆51Jul 8, 2013Updated 12 years ago
- Windows library for hooking functions across processes, injecting DLLs into other applications, and more. (Somewhat similar to MS Detours…☆12Apr 2, 2013Updated 13 years ago
- A memory engine that scans, debugs and disassembles an applications memory space.☆14Oct 29, 2017Updated 8 years ago
- Windows Syslog Command Line Client☆16Nov 21, 2012Updated 13 years ago
- PHP Vulnerability Hunter (fork)☆12May 8, 2015Updated 11 years ago
- ☆15Jun 12, 2015Updated 10 years ago
- This is my custom wordlist for WiFi passwords, tailored specifically for WiFi networks in Indonesia.☆21Nov 29, 2025Updated 5 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- NASM listing to shellcode converter☆14May 6, 2018Updated 8 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 13 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- Zenected Threat Defense VPN☆13Apr 28, 2017Updated 9 years ago
- File hosting service☆13May 28, 2017Updated 8 years ago
- fuzz testing framework for Linux system calls☆12Sep 4, 2015Updated 10 years ago
- Documents and whitepapers☆12Aug 9, 2016Updated 9 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Kernel Context [template c++] Library - K C L. Your stl for work in linux/windows kernel !!!☆11Jul 24, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Validate that a password hasn't been exposed in a data breach.☆13Mar 6, 2020Updated 6 years ago
- pass game protect☆11Apr 26, 2014Updated 12 years ago
- Example of intel virtualization extensions usage☆10Dec 15, 2016Updated 9 years ago
- Orujo allows the execution of several middlewares per route, working seamlessly with the standard net/http library.☆59Nov 22, 2015Updated 10 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆30Sep 28, 2015Updated 10 years ago
- Windows Crypt API hook to generate weak keys☆48Nov 1, 2016Updated 9 years ago
- advanced code generator for John the Ripper☆13May 6, 2018Updated 8 years ago