qnighy / ransomware-demo
A proof-of-concept for ransomware encryption
☆18Updated 8 years ago
Alternatives and similar repositories for ransomware-demo:
Users that are interested in ransomware-demo are comparing it to the libraries listed below
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 8 years ago
- All tools you needed during penetration testing.☆18Updated 8 years ago
- A rootkit for linux kernel >= 3.0☆19Updated 10 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Updated 12 years ago
- My metasploit modules☆11Updated 9 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- CTF Writeups☆18Updated 7 years ago
- ☆24Updated 6 years ago
- WAF bypass toolkit☆9Updated 9 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Updated 8 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- Set of useful scrpts☆10Updated 10 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Updated 6 years ago
- Some of the vulnerabilities that were found by Cybellum platform☆32Updated 7 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 9 years ago
- A collection of tools mostly written in Python.☆15Updated 10 years ago
- Blueborne CVE-2017-1000251 PoC for linux machines☆16Updated 2 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Updated 8 years ago
- A collection of Nmap NSE scripts that I made.☆27Updated 12 years ago
- (Unofficial) Python API for http://ransomwaretracker.abuse.ch/tracker/☆16Updated 8 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- FUD Metasploit Android Payload☆11Updated 9 years ago
- Post-explotation Hacks☆14Updated 6 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆14Updated 8 years ago
- ☆20Updated 8 years ago
- My presentations from different conferences☆15Updated 6 years ago
- ☆23Updated 7 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Updated 12 years ago
- lkm rootkit☆15Updated 10 years ago