shellbear / MerisaLinks
The MacOS ransomware project
☆14Updated 8 years ago
Alternatives and similar repositories for Merisa
Users that are interested in Merisa are comparing it to the libraries listed below
Sorting:
- Information Stealers Wall of Sheep (IS-WOS)☆12Updated 4 years ago
- Malware USB Spread | POC | Example☆8Updated 6 years ago
- Ransomware Decryptors☆36Updated 3 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Updated 9 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 6 years ago
- PowerShell Reverse HTTPs Shell☆28Updated 10 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- POC for a basic C2 server using the python aiohttp framework☆15Updated 5 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 3 years ago
- Generic malicious browser check written in C#☆13Updated 8 years ago
- Malicious Software SRC Extract☆31Updated 2 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆17Updated 7 years ago
- Commands to perform various activities related to penetration testing and red teaming☆19Updated 5 years ago
- HTTP BOTNET☆8Updated 2 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 10 years ago
- Disabling Windows Defender & downloading payload☆20Updated 4 years ago
- Is command prompt blocked on your school/work computers? Here is an easy fix!☆20Updated 5 years ago
- Python3 script to generate Office macros for the EvilOSX framework. Author: Cedric Owens☆27Updated 4 years ago
- Experimenting with destructive file attacks in Go☆18Updated 6 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆32Updated 6 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Updated 8 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 8 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆17Updated 3 years ago
- Version Releases of Splinter the RAT @Carpenter1010☆32Updated 10 years ago
- Various Crypter Project☆9Updated 11 years ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆29Updated 7 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Random stuff☆16Updated 7 years ago