sourceclear / ransomware-pocLinks
A poc to demonstrate how ransomware can spread to enterprise apps through libraries
☆11Updated 7 years ago
Alternatives and similar repositories for ransomware-poc
Users that are interested in ransomware-poc are comparing it to the libraries listed below
Sorting:
- A fast and advanced ransomware PoC☆60Updated 10 years ago
- Find the passwords for all wireless networks saved on a Windows Vista or later machine.☆20Updated 8 years ago
- Steganography software for encrypting text into image☆64Updated 3 months ago
- A web application for tracking your portfolio☆24Updated 3 years ago
- Modern Web Firewall: stop account takeovers, weak passwords, cloud IPs, DoS attacks, disposable emails☆120Updated 3 years ago
- Cyber-Physical Systems Guide☆13Updated 4 years ago
- random identity generator☆15Updated 8 years ago
- A clientless, safe, disposable chat service for safe and anonymous communication.☆32Updated last week
- A ransomware written in python for Windows☆13Updated 3 years ago
- A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.☆56Updated 2 years ago
- PNG Steganography Software☆30Updated 9 years ago
- Advanced Hash Manipulation☆176Updated 6 years ago
- Automated Cyber Offense☆91Updated 6 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22Updated 10 years ago
- It's a tool which generate a dictionary from a csv containing personals informations. Generate all common passwords based on perso info.…☆57Updated 5 years ago
- steal cookies from firefox cookies database(cookies.sqlite)☆54Updated 10 years ago
- Encryption using 2 Factor Authentication through an external drive with Python☆12Updated 5 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Updated 11 years ago
- Proof-of-concept python IRC botnet for orchestrating macOS computers (harmless due to SIP & Gatekeeper)☆83Updated 4 years ago
- Curated archive of tools from the Wikileaks CIA hacking tool leak, pull requests welcome https://wikileaks.org/ciav7p1/☆124Updated 8 years ago
- The Pentester's Swiss Army Knife☆28Updated 5 years ago
- A collection of fraud related tools for research.☆151Updated 6 years ago
- OWASP Passfault evaluates passwords and enforces password policy in a completely different way.☆177Updated 4 years ago
- Detect credit card exposures with Bro☆15Updated 2 years ago
- ☆15Updated 5 years ago
- TOR Mail encrypted server for Hidden Services☆43Updated 9 years ago
- WhatsApp forensics analysis and acquisition utility☆26Updated 12 years ago
- Digital Forensics with Kali Linux, published by Packt☆98Updated 2 years ago
- Wide internet scanner for etherum and other bitcoin mining devices using default SSH credentials☆46Updated 3 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆34Updated 9 years ago