utkusen / hidden-tearLinks
an open source ransomware honeypot
☆902Updated 9 years ago
Alternatives and similar repositories for hidden-tear
Users that are interested in hidden-tear are comparing it to the libraries listed below
Sorting:
- A PoC backdoor that uses Gmail as a C&C server☆1,345Updated 6 years ago
- Extracts passwords from a KeePass 2.x database, directly from memory.☆1,019Updated 9 years ago
- A fast and stealthy credential harvester☆629Updated 2 years ago
- Advanced CPU-based password recovery utility☆2,159Updated 3 years ago
- KeySweeper is a stealthy Arduino-based device, camouflaged as a functioning USB wall charger, that wirelessly and passively sniffs, decry…☆1,115Updated 8 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a cross-platform firewall-evading backdoo…☆1,255Updated 8 years ago
- wireless hacking - This is automated wireless hacking tool☆1,267Updated 2 years ago
- Wannacry in-memory key recovery☆1,087Updated 8 years ago
- A fully featured backdoor that uses Twitter as a C&C server☆784Updated 5 years ago
- A python2 script for sweeping a network to find windows systems compromised with the DOUBLEPULSAR implant.☆1,029Updated 5 years ago
- Chromebackdoor is a PoC of pentest tool, this tool use a MITB technique for generate a windows executable ".exe" after launch run a malic…☆516Updated 8 years ago
- Sniffing browser history using HSTS☆935Updated 8 years ago
- powerful auto-backdooring utility☆752Updated 7 years ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,099Updated 7 years ago
- This is a POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing …☆589Updated 3 years ago
- peinjector - MITM PE file infector☆606Updated 9 years ago
- Various PoCs☆491Updated 5 years ago
- Snoopy: A distributed tracking and data interception framework☆609Updated 12 years ago
- Automated wanadecrypt with key recovery if lucky☆799Updated 8 years ago
- Leaked Linux.Mirai Source Code for Research/IoC Development Purposes☆561Updated 8 years ago
- Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE …☆310Updated 3 years ago
- a more complex ransomware honeypot☆122Updated 9 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,682Updated 5 years ago
- EternalRocks worm☆461Updated 8 years ago
- A command line tool to detect shared passwords☆403Updated 9 years ago
- All your IPs are belong to us.☆672Updated 7 years ago
- Anonymize and fracture network traffic/Internet access over a point-to-point wireless link or through TCP->GSM->wifi tunnel (advanced res…☆361Updated 10 years ago
- Proof of concept for CVE-2015-7547☆544Updated 9 years ago
- WarBerryPi - Tactical Exploitation☆2,224Updated 5 years ago
- DNS Exfiltration tool for stealthily sending files over DNS requests.☆1,726Updated 3 years ago