qnighy / ransomware-demoView external linksLinks
A proof-of-concept for ransomware encryption
☆18Nov 29, 2025Updated 2 months ago
Alternatives and similar repositories for ransomware-demo
Users that are interested in ransomware-demo are comparing it to the libraries listed below
Sorting:
- Sise supplicant exploit kit -- 华软蝴蝶漏洞利用工具包..☆14Mar 11, 2016Updated 9 years ago
- Windows Optimizer☆27Dec 25, 2012Updated 13 years ago
- A project to learn about malware and c++ coding☆23Sep 5, 2015Updated 10 years ago
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆27May 14, 2016Updated 9 years ago
- ☆27Nov 4, 2015Updated 10 years ago
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Nov 28, 2017Updated 8 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Sep 28, 2015Updated 10 years ago
- This is my custom wordlist for WiFi passwords, tailored specifically for WiFi networks in Indonesia.☆13Nov 29, 2025Updated 2 months ago
- A fast and advanced ransomware PoC☆60Aug 24, 2015Updated 10 years ago
- libdft for win☆52Jul 8, 2013Updated 12 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- Online Judge that accepts a solution and judges it as Accepted, Compilation Error, Runtime Error, Time Limit Exceeded or Wrong Answer.☆14Mar 10, 2023Updated 2 years ago
- ☆10Aug 26, 2016Updated 9 years ago
- SSH brute-forcing tool written in python☆15Feb 10, 2023Updated 3 years ago
- ☆15Aug 11, 2014Updated 11 years ago
- ☆10Jun 1, 2014Updated 11 years ago
- AndFix 热修复☆13Jun 13, 2016Updated 9 years ago
- This is a old tool for the mBot Crack☆12Feb 4, 2015Updated 11 years ago
- The Art of the Steal / Deal - Made in Austria - Collection of Token White Papers on the Blockchain - Incl. Scam Alert - Thanks for your m…☆10Jan 2, 2021Updated 5 years ago
- Peer to Peer Payments via NFC - Built for IC Hack 2014☆10Dec 19, 2016Updated 9 years ago
- A memory engine that scans, debugs and disassembles an applications memory space.☆14Oct 29, 2017Updated 8 years ago
- Windows PE file debugger☆11Aug 30, 2017Updated 8 years ago
- Windows Remote Access Trojan (RAT)☆86Nov 12, 2015Updated 10 years ago
- 一款 Windows 下的远程控制软件的实现,界面基于Qt 4.x图形库。☆44Mar 29, 2013Updated 12 years ago
- The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth stacks.☆36Sep 30, 2024Updated last year
- Keep It Secure Private Data Encryption & Decryption Tool☆45Mar 11, 2018Updated 7 years ago
- movie to animation gif converter☆61Feb 18, 2013Updated 13 years ago
- Game Hacking Adventures Scripts & Tools☆20Dec 29, 2012Updated 13 years ago
- this android application detects the fake towers(base stations)☆10Oct 5, 2017Updated 8 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- bmod parses binaries for modification/patching and disassembles machine code sections.☆12Apr 19, 2018Updated 7 years ago
- ☆15Mar 28, 2015Updated 10 years ago
- NASM listing to shellcode converter☆14May 6, 2018Updated 7 years ago
- ☆10Mar 31, 2016Updated 9 years ago
- Various CTF challenge solutions☆12Apr 20, 2021Updated 4 years ago
- ☆10Jul 13, 2015Updated 10 years ago
- ☆12Nov 17, 2014Updated 11 years ago
- ☆12Jul 17, 2016Updated 9 years ago
- Windows Kernel Mode PCRE☆10Feb 4, 2015Updated 11 years ago