a more complex ransomware honeypot
☆126Mar 27, 2016Updated 9 years ago
Alternatives and similar repositories for eda2
Users that are interested in eda2 are comparing it to the libraries listed below
Sorting:
- an ancient http botnet☆15Apr 4, 2015Updated 10 years ago
- an open source ransomware honeypot☆908Jan 27, 2016Updated 10 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- rsmware forked C#/PHP/MySQL☆14Apr 27, 2017Updated 8 years ago
- [Exploit] vBulletin 5.1.x - PreAuth Remote Code Execution☆20Aug 27, 2021Updated 4 years ago
- like hidden-tear with libsodium☆21Aug 20, 2015Updated 10 years ago
- Clone of hidden tear written in C++☆70Oct 18, 2020Updated 5 years ago
- python version of "house party protocol" program☆24Mar 30, 2015Updated 10 years ago
- Simple Bash Rasomware for use in Cyber Exercises☆116Apr 3, 2016Updated 9 years ago
- an ultimate evidence wiper☆64Mar 30, 2015Updated 10 years ago
- Malware Analysis Tool using Function Level Fuzzy Hashing☆191Dec 19, 2015Updated 10 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Jul 9, 2014Updated 11 years ago
- ☆15Mar 24, 2016Updated 9 years ago
- Yet another Python library to read and write PE/PE+ files.☆78Oct 6, 2016Updated 9 years ago
- Rootkit☆24Nov 15, 2014Updated 11 years ago
- A remote access trojan over DNS☆98Dec 23, 2015Updated 10 years ago
- simple rootkit for computer security class☆15Dec 18, 2012Updated 13 years ago
- Allows a user to grab documentation from online MSDN for a given function name in IDA, and import the documentation as a repeatable comme…☆15Jul 22, 2012Updated 13 years ago
- Protect your parents from phishing☆40Dec 4, 2017Updated 8 years ago
- EasyCTF Writeups☆13Jan 10, 2015Updated 11 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- ☆32May 9, 2021Updated 4 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Sep 28, 2015Updated 10 years ago
- Network traffic sensor☆115Jun 8, 2022Updated 3 years ago
- PE rebuilder, based on yoda's realigndll☆12Oct 1, 2011Updated 14 years ago
- A program to shred files and folders securely☆11Apr 9, 2016Updated 9 years ago
- ☆68Jun 21, 2017Updated 8 years ago
- Viper is a brute-force password cracker.☆24Feb 10, 2016Updated 10 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Windows Remote Access Trojan (RAT)☆87Nov 12, 2015Updated 10 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Sep 29, 2015Updated 10 years ago
- Volatility Plugins☆22May 1, 2015Updated 10 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Oct 25, 2015Updated 10 years ago
- WinEoP Exploitation Framework☆25Jan 7, 2016Updated 10 years ago
- ☆15Jan 14, 2016Updated 10 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆12Oct 10, 2015Updated 10 years ago