The MacOS ransomware project
☆14Jun 24, 2017Updated 8 years ago
Alternatives and similar repositories for Merisa
Users that are interested in Merisa are comparing it to the libraries listed below
Sorting:
- Onion Website Template☆10Oct 24, 2021Updated 4 years ago
- Converts pcap files to hc2200☆10Dec 6, 2023Updated 2 years ago
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 4 years ago
- ☆70Oct 19, 2011Updated 14 years ago
- Projects for AWS ThreatHunting☆21Aug 20, 2021Updated 4 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Sep 2, 2018Updated 7 years ago
- ☆26Apr 24, 2019Updated 6 years ago
- The original slurp source☆32Nov 25, 2018Updated 7 years ago
- ☆34Jul 10, 2022Updated 3 years ago
- Eltima Port Virtualization Technology may be integrated to the software or hardware solutions to get the remote access to network devices☆10Jun 6, 2018Updated 7 years ago
- ☆10Aug 4, 2022Updated 3 years ago
- Generate a Employee monthly payslip download as pdf and send to their mail☆10Sep 18, 2022Updated 3 years ago
- A proof-of-concept reverse-shell written in rust.☆32Apr 26, 2019Updated 6 years ago
- Script to download handshakes from your Pwnagotchi☆36Nov 27, 2022Updated 3 years ago
- Bella Ducky Script for USB Rubber Ducky from HAK5☆35Oct 19, 2020Updated 5 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- Ducky Script is the payload language of Hak5 gear. Since its introduction with the USB Rubber Ducky in 2010, Ducky Script has grown in ca…☆12Jun 20, 2024Updated last year
- Simple protector to show how to run a payload without dropping it using RunPE Technique☆35Jul 3, 2017Updated 8 years ago
- pivottablejs for air-gapped systems☆13Aug 14, 2024Updated last year
- Network aware keylogger: broadcasting on your local area network.☆22Jul 29, 2013Updated 12 years ago
- Try to detect HTTP desync attack (https://portswigger.net/blog/http-desync-attacks-request-smuggling-reborn)☆11Sep 20, 2019Updated 6 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Jun 12, 2019Updated 6 years ago
- React UI☆11Jan 4, 2023Updated 3 years ago
- ☆10May 15, 2023Updated 2 years ago
- This is a WIP. Here be dragons.☆12Jun 28, 2019Updated 6 years ago
- BASH + VIM = Cryptolocker☆11Jul 31, 2018Updated 7 years ago
- DLL Unhooking☆13Mar 26, 2021Updated 4 years ago
- ☆11Dec 22, 2022Updated 3 years ago
- Hax That F#uck Html Page☆10Mar 13, 2018Updated 7 years ago
- Sample code for locating Particle Photons on your local network for direct client-server communication☆11Aug 4, 2016Updated 9 years ago
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Dec 16, 2021Updated 4 years ago
- Simple Golang JWT Bruteforcer 2☆10May 25, 2021Updated 4 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Discord Webhook Cannon is a C# multithreaded, open-source Discord Webhook flooder. It can be used to flood webhooks which are used in mal…☆10Mar 14, 2021Updated 4 years ago