shellbear / MerisaLinks
The MacOS ransomware project
☆14Updated 8 years ago
Alternatives and similar repositories for Merisa
Users that are interested in Merisa are comparing it to the libraries listed below
Sorting:
- Python3 script to generate Office macros for the EvilOSX framework. Author: Cedric Owens☆27Updated 4 years ago
- Malware USB Spread | POC | Example☆8Updated 6 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆30Updated 6 years ago
- Is command prompt blocked on your school/work computers? Here is an easy fix!☆20Updated 5 years ago
- Agent Tesla Spyware C2 Exploit [PATCHED]☆31Updated 6 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆34Updated 8 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆19Updated 6 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Malicious Software SRC Extract☆31Updated 2 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆12Updated 4 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 10 years ago
- A simple python reverse shell written just for fun.☆65Updated 2 years ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆29Updated 8 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆32Updated 6 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 6 years ago
- Python implementation of the SlowLoris DoS attack.☆24Updated 8 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Updated 9 years ago
- Various Crypter Project☆9Updated 11 years ago
- The Python Password-Protected Obfuscator☆34Updated 6 years ago
- Ransomware Decryptors☆36Updated 3 years ago
- Information Stealers Wall of Sheep (IS-WOS)☆12Updated 4 years ago
- PowerShell Reverse HTTPs Shell☆28Updated 10 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 7 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- Collection of scripts that I have used on Red Team engagements☆16Updated 7 years ago
- Handy script to automate the attack☆21Updated 5 years ago
- ☆23Updated 5 years ago
- Miscellaneous exploit code☆20Updated 8 years ago
- A redteam tool to obfuscate IPv4 addresses to evade AV or Application Firewalls☆19Updated 5 years ago