PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.
☆29Nov 22, 2025Updated 4 months ago
Alternatives and similar repositories for Graverobber
Users that are interested in Graverobber are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code that allows running another windows PE in the same address space as the host process.☆11Nov 19, 2019Updated 6 years ago
- Ransomware for demonstration☆19Feb 28, 2023Updated 3 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Nov 28, 2017Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A forensic analysis framework for enumerating slack artifacts residing in the Operating system.☆18Sep 23, 2025Updated 6 months ago
- Ransomware Decryptors☆35Apr 28, 2022Updated 3 years ago
- AppXSVC Service race condition - privilege escalation☆30Jul 30, 2019Updated 6 years ago
- Camera Hack bot - Powered by XPH4N70M☆27May 26, 2023Updated 2 years ago
- Simple Golang JWT Bruteforcer 2☆10May 25, 2021Updated 4 years ago
- Red Team C2 and Post Exploitation code☆36Mar 10, 2026Updated last month
- recover Firefox and more browsers logins☆49Nov 23, 2021Updated 4 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆150Nov 19, 2021Updated 4 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆15Jan 20, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Zero-Day Vulnerability in File Manager Plugin 6.7 ( CVE 2020-25213 )☆12Feb 21, 2023Updated 3 years ago
- A simple python scanner to detect vulnerable hosts in your net☆21May 15, 2017Updated 8 years ago
- A C ransomware(educational only)☆22Feb 3, 2022Updated 4 years ago
- Repo to host a comprehensive list of all my Public Gists with a short description for each item and a link to the Gist pages in question.…☆16Apr 27, 2021Updated 4 years ago
- Really useful hacking tools.☆19Dec 16, 2023Updated 2 years ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆30Jul 6, 2017Updated 8 years ago
- A Docker image of Knot DNS Resolver with hBlock.☆34Apr 1, 2026Updated 2 weeks ago
- This is the list of all rootkits found so far on github and othersites.☆30Dec 7, 2020Updated 5 years ago
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Feb 16, 2025Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A malware researching repository.☆21Aug 10, 2021Updated 4 years ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆18Aug 20, 2023Updated 2 years ago
- A resource center app for iOS jailbreaks and iCloud bypasses!☆14Apr 15, 2023Updated 3 years ago
- Articles, White Papers, Technical Write-Ups and more authored by members of the GreySec community. Curated by staff, selected for excelle…☆28Aug 17, 2021Updated 4 years ago
- Fateh-Framework is a simple C2 (Command & Control) tool that attacking windows/Linux machines.☆10Mar 10, 2026Updated last month
- OpenPST - Phone servicing tool for Qualcomm SoC devices☆10Feb 9, 2016Updated 10 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Apr 16, 2021Updated 5 years ago
- A python trojan with spyware, info stealing and ransomware abilities.☆34Sep 12, 2025Updated 7 months ago
- Categorized hosts files for DNS based content blocking☆33Nov 7, 2025Updated 5 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Android-Image-Modifier is script/tool to make unpacking repacking of system files easier and less tedious. So android modders/tweakers ca…☆13May 26, 2020Updated 5 years ago
- POWER(SHELL) ALL THE THINGS!☆38Mar 30, 2026Updated 2 weeks ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Oct 21, 2023Updated 2 years ago
- Ro3b - Advance Banking HTTP Botnet☆49Jun 12, 2023Updated 2 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- A proof-of-concept Node.js ransomware☆21Mar 27, 2022Updated 4 years ago
- My personalized Hosts file collection of various sources, cleaned and optimized specially for pDNSf☆31Updated this week