utkusen / hidden-tearLinks
an open source ransomware honeypot
☆901Updated 9 years ago
Alternatives and similar repositories for hidden-tear
Users that are interested in hidden-tear are comparing it to the libraries listed below
Sorting:
- a more complex ransomware honeypot☆122Updated 9 years ago
- A PoC backdoor that uses Gmail as a C&C server☆1,335Updated 6 years ago
- A fully featured backdoor that uses Twitter as a C&C server☆773Updated 4 years ago
- A fast and stealthy credential harvester☆624Updated last year
- powerful auto-backdooring utility☆747Updated 7 years ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆1,001Updated 3 years ago
- Various PoCs☆491Updated 5 years ago
- Extracts passwords from a KeePass 2.x database, directly from memory.☆1,009Updated 9 years ago
- A command line tool to detect shared passwords☆402Updated 8 years ago
- Remote administration service which uses twitter as a command and control server☆713Updated 4 years ago
- Chromebackdoor is a PoC of pentest tool, this tool use a MITB technique for generate a windows executable ".exe" after launch run a malic…☆510Updated 8 years ago
- peinjector - MITM PE file infector☆603Updated 9 years ago
- Malcom - Malware Communications Analyzer☆1,161Updated 7 years ago
- EternalRocks worm☆459Updated 8 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆1,369Updated 2 years ago
- Brand New Code Injection for Windows☆730Updated 4 years ago
- Inject code and spy on wifi users☆2,600Updated 3 years ago
- Leaked Linux.Mirai Source Code for Research/IoC Development Purposes☆563Updated 8 years ago
- A python2 script for sweeping a network to find windows systems compromised with the DOUBLEPULSAR implant.☆1,027Updated 5 years ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,502Updated 7 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,673Updated 5 years ago
- ransomware open-sources☆769Updated 4 years ago
- BrowserBackdoor is an Electron Application with a JavaScript WebSocket Backdoor and a Ruby Command-Line Listener☆344Updated 2 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a cross-platform firewall-evading backdoo…☆1,249Updated 8 years ago
- wireless hacking - This is automated wireless hacking tool☆1,255Updated 2 years ago
- Advanced CPU-based password recovery utility☆2,149Updated 2 years ago
- Proof of concept for CVE-2015-7547☆544Updated 9 years ago
- ☆135Updated 9 years ago
- Malware exploits☆545Updated 5 years ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆679Updated 3 years ago