sourceclear / ransomware-pocLinks
A poc to demonstrate how ransomware can spread to enterprise apps through libraries
☆11Updated 7 years ago
Alternatives and similar repositories for ransomware-poc
Users that are interested in ransomware-poc are comparing it to the libraries listed below
Sorting:
- A fast and advanced ransomware PoC☆60Updated 10 years ago
- zvadohacks are tools build with python for web scouting sniffing and pen testing☆22Updated 4 years ago
- Find the passwords for all wireless networks saved on a Windows Vista or later machine.☆19Updated 8 years ago
- Steganography software for encrypting text into image☆61Updated last month
- An open-source antivirus for windows☆46Updated 5 years ago
- The Pentester's Swiss Army Knife☆28Updated 5 years ago
- PNG Steganography Software☆30Updated 9 years ago
- learning related projects☆17Updated 10 years ago
- Transplant adore rootkit for Android platform.☆37Updated 11 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22Updated 10 years ago
- A Unix rootkit☆17Updated 5 years ago
- Advanced Hash Manipulation☆176Updated 5 years ago
- Try to bruteforce several cypher algorithms that can be used in CTFs☆13Updated 3 years ago
- Automated Cyber Offense☆91Updated 6 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Updated 11 years ago
- Arya is a simple obfuscator for .NET binaries.☆39Updated 7 years ago
- A collection of steganography tools.☆15Updated 4 years ago
- Human Oriented SHell☆27Updated last year
- Modern Web Firewall: stop account takeovers, weak passwords, cloud IPs, DoS attacks, disposable emails☆120Updated 3 years ago
- Encryption using 2 Factor Authentication through an external drive with Python☆12Updated 5 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- CPH:SEC - Copenhagen Ethical Hacking and Penetration Testing Society☆44Updated 2 years ago
- ☆15Updated 5 years ago
- Transform dumped executable memory back into an identical match from disk. Use network or local database to de-locate relocated binaries…☆12Updated 9 years ago
- Crack SSH Password using Dictionary and Brute Force Method☆52Updated 6 years ago
- Windows Auto Post Exploitation - For ReD Team☆16Updated 6 years ago
- Wide internet scanner for etherum and other bitcoin mining devices using default SSH credentials☆46Updated 3 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆26Updated 8 years ago
- An interactive network analysis & visualization tool☆23Updated 5 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 8 years ago