A proof-of-concept for ransomware encryption
☆18Nov 29, 2025Updated 3 months ago
Alternatives and similar repositories for ransomware-demo
Users that are interested in ransomware-demo are comparing it to the libraries listed below
Sorting:
- Simple daemon to create a wifi hotspot on Linux☆14May 17, 2020Updated 5 years ago
- Sise supplicant exploit kit -- 华软蝴蝶漏洞利用工具包..☆14Mar 11, 2016Updated 10 years ago
- Hacking environment installation scripts for OS X☆28Jan 16, 2022Updated 4 years ago
- movie to animation gif converter☆61Feb 18, 2013Updated 13 years ago
- ☆27Nov 4, 2015Updated 10 years ago
- A project to learn about malware and c++ coding☆23Sep 5, 2015Updated 10 years ago
- Research on the various credentials databases that have been dumped.☆11Jan 31, 2018Updated 8 years ago
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Nov 28, 2017Updated 8 years ago
- Windows PE file debugger☆11Aug 30, 2017Updated 8 years ago
- Windows Optimizer☆27Dec 25, 2012Updated 13 years ago
- A short and small memory forensics helper.☆52Oct 18, 2017Updated 8 years ago
- A fast and advanced ransomware PoC☆60Aug 24, 2015Updated 10 years ago
- Naively estimate entropic probability☆38Nov 9, 2021Updated 4 years ago
- Windows Kernel Mode PCRE☆10Feb 4, 2015Updated 11 years ago
- ☆10Jun 1, 2014Updated 11 years ago
- bmod parses binaries for modification/patching and disassembles machine code sections.☆12Apr 19, 2018Updated 7 years ago
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆27May 14, 2016Updated 9 years ago
- libdft for win☆51Jul 8, 2013Updated 12 years ago
- Windows library for hooking functions across processes, injecting DLLs into other applications, and more. (Somewhat similar to MS Detours…☆12Apr 2, 2013Updated 12 years ago
- A memory engine that scans, debugs and disassembles an applications memory space.☆14Oct 29, 2017Updated 8 years ago
- Windows Syslog Command Line Client☆15Nov 21, 2012Updated 13 years ago
- PHP Vulnerability Hunter (fork)☆13May 8, 2015Updated 10 years ago
- ☆15Jun 12, 2015Updated 10 years ago
- NASM listing to shellcode converter☆14May 6, 2018Updated 7 years ago
- This is my custom wordlist for WiFi passwords, tailored specifically for WiFi networks in Indonesia.☆16Nov 29, 2025Updated 3 months ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- Zenected Threat Defense VPN☆13Apr 28, 2017Updated 8 years ago
- File hosting service☆13May 28, 2017Updated 8 years ago
- Some Of Huawei Routers Exploits☆13Sep 1, 2016Updated 9 years ago
- fuzz testing framework for Linux system calls☆12Sep 4, 2015Updated 10 years ago
- Documents and whitepapers☆12Aug 9, 2016Updated 9 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Kernel Context [template c++] Library - K C L. Your stl for work in linux/windows kernel !!!☆11Jul 24, 2018Updated 7 years ago
- Validate that a password hasn't been exposed in a data breach.☆13Mar 6, 2020Updated 6 years ago
- Example of intel virtualization extensions usage☆10Dec 15, 2016Updated 9 years ago
- pass game protect☆12Apr 26, 2014Updated 11 years ago
- Orujo allows the execution of several middlewares per route, working seamlessly with the standard net/http library.☆59Nov 22, 2015Updated 10 years ago
- advanced code generator for John the Ripper☆13May 6, 2018Updated 7 years ago