a more complex ransomware honeypot
☆125Mar 27, 2016Updated 9 years ago
Alternatives and similar repositories for eda2
Users that are interested in eda2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- an ancient http botnet☆15Apr 4, 2015Updated 10 years ago
- an open source ransomware honeypot☆911Jan 27, 2016Updated 10 years ago
- an ultimate evidence wiper☆64Mar 30, 2015Updated 10 years ago
- python version of "house party protocol" program☆24Mar 30, 2015Updated 10 years ago
- ☆32May 9, 2021Updated 4 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- rsmware forked C#/PHP/MySQL☆14Apr 27, 2017Updated 8 years ago
- like hidden-tear with libsodium☆21Aug 20, 2015Updated 10 years ago
- Clone of hidden tear written in C++☆70Oct 18, 2020Updated 5 years ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Jul 9, 2014Updated 11 years ago
- [Exploit] vBulletin 5.1.x - PreAuth Remote Code Execution☆20Aug 27, 2021Updated 4 years ago
- Personalized wordlist generator with NLP, by analyzing tweets. (A.K.A crunch2049)☆136Dec 21, 2019Updated 6 years ago
- Simple Bash Rasomware for use in Cyber Exercises☆116Apr 3, 2016Updated 9 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Allows a user to grab documentation from online MSDN for a given function name in IDA, and import the documentation as a repeatable comme…☆15Jul 22, 2012Updated 13 years ago
- DFIR notebooks GCIH Gold project, paper☆12Apr 30, 2015Updated 10 years ago
- ransomware open-sources☆794Jul 8, 2020Updated 5 years ago
- Malware Analysis Tool using Function Level Fuzzy Hashing☆191Dec 19, 2015Updated 10 years ago
- Unix remote-shell backdoor develop with Bash, Netcat, OpenSSL (data encryption with AES-128bit)☆25Oct 21, 2017Updated 8 years ago
- Yet another Python library to read and write PE/PE+ files.☆78Oct 6, 2016Updated 9 years ago
- Small Backdoor/rootkit for linux kernel☆21Jan 26, 2014Updated 12 years ago
- The NoSQL Honeypot Framework☆103Oct 17, 2023Updated 2 years ago
- Protect your parents from phishing☆40Dec 4, 2017Updated 8 years ago
- A browser extension that seamlessly integrates your yara match notifications into VirusTotal Intelligence.☆17Feb 8, 2015Updated 11 years ago
- EasyCTF Writeups☆13Jan 10, 2015Updated 11 years ago
- simple rootkit for computer security class☆15Dec 18, 2012Updated 13 years ago
- a low(zero) cost threat intelligence&response tool against phishing domains☆157Dec 8, 2022Updated 3 years ago
- It's a tool to manage vulnerables packages in your *nix server, in a centralized way☆30Dec 15, 2020Updated 5 years ago
- ☆68Jun 21, 2017Updated 8 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Sep 29, 2015Updated 10 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆12Oct 10, 2015Updated 10 years ago
- Network traffic sensor☆115Jun 8, 2022Updated 3 years ago
- ☆15Mar 24, 2016Updated 9 years ago
- Experimental: Windows .text section compare - disk versus memory☆15Jan 21, 2015Updated 11 years ago
- ☆16Jan 14, 2016Updated 10 years ago
- Home made trojan (c/c++)☆12Apr 14, 2023Updated 2 years ago
- WinEoP Exploitation Framework☆25Jan 7, 2016Updated 10 years ago
- This is php backdoor hack to access directory, access to mysql, access to execute shell command☆25Oct 23, 2015Updated 10 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆108Aug 13, 2018Updated 7 years ago