sourceclear / ransomware-pocLinks
A poc to demonstrate how ransomware can spread to enterprise apps through libraries
☆11Updated 7 years ago
Alternatives and similar repositories for ransomware-poc
Users that are interested in ransomware-poc are comparing it to the libraries listed below
Sorting:
- A fast and advanced ransomware PoC☆60Updated 10 years ago
- Find the passwords for all wireless networks saved on a Windows Vista or later machine.☆19Updated 8 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22Updated 10 years ago
- Automated Cyber Offense☆88Updated 6 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆34Updated 9 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Updated 11 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 9 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆26Updated 8 years ago
- Simple Tool For Brute Force The Truecrypt Files☆10Updated 11 years ago
- Crack SSH Password using Dictionary and Brute Force Method☆52Updated 6 years ago
- Orwell is a RAT and Botnet designed as a trio of programs by Landon Powell.☆31Updated 8 years ago
- The Pentester's Swiss Army Knife☆26Updated 5 years ago
- ☆15Updated 5 years ago
- Searches for strings, regex, credit card numbers of magnetic stripe card tracks in a Windows process's memory space☆124Updated 4 years ago
- ☆28Updated 9 years ago
- some python3 functions to add spreading features to any python backdoor☆55Updated 8 years ago
- Modern Web Firewall: stop account takeovers, weak passwords, cloud IPs, DoS attacks, disposable emails☆120Updated 3 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Updated 10 years ago
- Steganography software for encrypting text into image☆64Updated 4 months ago
- PoC Android smart phone botnet☆79Updated 13 years ago
- Capstone: Keylogger Trojan☆34Updated 7 years ago
- Calculator for finding the degrees of separation and the shortest path between two Wikipedia articles.☆15Updated 8 years ago
- PNG Steganography Software☆30Updated 9 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆53Updated 7 years ago
- A HTTP bot in Java with basic commands and ability's☆10Updated 10 years ago
- Wide internet scanner for etherum and other bitcoin mining devices using default SSH credentials☆48Updated 3 years ago
- Automatically exported from code.google.com/p/hookme☆14Updated 10 years ago
- Projects based on Machine Learning☆10Updated 5 years ago
- A ctypes powered python keylogger.☆107Updated 6 years ago
- I created my own Keylogger I am going to open source its code .But no one is allowed to use it commercially and I have actual copy right…☆11Updated 8 years ago