sourceclear / ransomware-pocLinks
A poc to demonstrate how ransomware can spread to enterprise apps through libraries
☆11Updated 7 years ago
Alternatives and similar repositories for ransomware-poc
Users that are interested in ransomware-poc are comparing it to the libraries listed below
Sorting:
- Find the passwords for all wireless networks saved on a Windows Vista or later machine.☆19Updated 8 years ago
- A fast and advanced ransomware PoC☆60Updated 10 years ago
- Crack SSH Password using Dictionary and Brute Force Method☆52Updated 6 years ago
- Transplant adore rootkit for Android platform.☆37Updated 11 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22Updated 10 years ago
- Calculator for finding the degrees of separation and the shortest path between two Wikipedia articles.☆15Updated 8 years ago
- Curated archive of tools from the Wikileaks CIA hacking tool leak, pull requests welcome https://wikileaks.org/ciav7p1/☆124Updated 8 years ago
- The Pentester's Swiss Army Knife☆28Updated 5 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Updated 11 years ago
- Automated Cyber Offense☆91Updated 6 years ago
- Detect credit card exposures with Bro☆15Updated last year
- A web application for tracking your portfolio☆24Updated 3 years ago
- PNG Steganography Software☆30Updated 9 years ago
- CPH:SEC - Copenhagen Ethical Hacking and Penetration Testing Society☆44Updated 3 years ago
- Papers about known hacking, security, hardware, software, computer, network and other ressources.☆78Updated 6 years ago
- intrusion detection☆24Updated 8 years ago
- Advanced Hash Manipulation☆176Updated 5 years ago
- Utilizing various Open Source Intelligence (OSINT) tools and techniques that we have found to be effective, DataSploit brings them all in…☆31Updated 8 years ago
- Java Ransomware☆129Updated 7 months ago
- Simple security surveillance script for linux distributions.☆60Updated 8 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆26Updated 8 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 8 years ago
- ☆15Updated last year
- Searches for strings, regex, credit card numbers of magnetic stripe card tracks in a Windows process's memory space☆124Updated 4 years ago
- Shodan.io Command Line Interface☆44Updated 4 years ago
- A simple python scanner to detect vulnerable hosts in your net☆21Updated 8 years ago
- This is a fuzzer for automated web application scanners and vulnerability scanners. The idea is to send an unexpectedly large response to…☆24Updated 10 years ago
- Steganography software for encrypting text into image☆62Updated 2 months ago
- Wide internet scanner for etherum and other bitcoin mining devices using default SSH credentials☆45Updated 3 years ago
- PoC Android smart phone botnet☆78Updated 13 years ago