sourceclear / ransomware-pocLinks
A poc to demonstrate how ransomware can spread to enterprise apps through libraries
☆11Updated 7 years ago
Alternatives and similar repositories for ransomware-poc
Users that are interested in ransomware-poc are comparing it to the libraries listed below
Sorting:
- A fast and advanced ransomware PoC☆60Updated 10 years ago
- Automated Cyber Offense☆88Updated 6 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22Updated 10 years ago
- Find the passwords for all wireless networks saved on a Windows Vista or later machine.☆19Updated 8 years ago
- This repo contains scripts, frameworks, and other tools related to DDoS.☆36Updated 6 years ago
- steal cookies from firefox cookies database(cookies.sqlite)☆57Updated 10 years ago
- An open-source antivirus for windows☆47Updated 6 years ago
- The Pentester's Swiss Army Knife☆26Updated 6 years ago
- Transplant adore rootkit for Android platform.☆40Updated 11 years ago
- Wide internet scanner for etherum and other bitcoin mining devices using default SSH credentials☆48Updated 3 years ago
- This tool creates almost undetectabe trojan virus to exploit windows machine.☆135Updated 8 years ago
- Twitter Bot to perform advanced search and automated response☆13Updated 8 years ago
- CryptoTrojan in Python (For educational purpose ONLY)☆50Updated 7 years ago
- Ransomeware☆48Updated 8 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Updated 11 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 8 years ago
- .Net library to create Maltego transformations.☆17Updated 11 months ago
- HexInject is a very versatile packet injector and sniffer, that provide a command-line framework for raw network access.☆24Updated 8 years ago
- Steganography software for encrypting text into image☆64Updated 6 months ago
- Crack SSH Password using Dictionary and Brute Force Method☆52Updated 6 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆26Updated 8 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 9 years ago
- Simple security surveillance script for linux distributions.☆59Updated 9 years ago
- Generate customized and undetectable exploits for Metasploit.☆22Updated 8 years ago
- THIS REPOSITORY IS STALE. Collection of resources for penetration testing, ethical hacking, cybersecurity, organized by user context.☆10Updated 9 years ago
- Capstone: Keylogger Trojan☆34Updated 7 years ago
- A collection of fraud related tools for research.☆150Updated 6 years ago
- Advanced Hash Manipulation☆175Updated 6 years ago
- A ctypes powered python keylogger.☆107Updated 6 years ago
- A Unix rootkit☆16Updated 5 years ago