utkusen / hidden-tearLinks
an open source ransomware honeypot
☆901Updated 9 years ago
Alternatives and similar repositories for hidden-tear
Users that are interested in hidden-tear are comparing it to the libraries listed below
Sorting:
- A PoC backdoor that uses Gmail as a C&C server☆1,335Updated 6 years ago
- A fast and stealthy credential harvester☆625Updated 2 years ago
- Extracts passwords from a KeePass 2.x database, directly from memory.☆1,014Updated 9 years ago
- powerful auto-backdooring utility☆747Updated 7 years ago
- A fully featured backdoor that uses Twitter as a C&C server☆776Updated 4 years ago
- Automated wanadecrypt with key recovery if lucky☆796Updated 8 years ago
- Advanced CPU-based password recovery utility☆2,152Updated 2 years ago
- wireless hacking - This is automated wireless hacking tool☆1,260Updated 2 years ago
- A python2 script for sweeping a network to find windows systems compromised with the DOUBLEPULSAR implant.☆1,028Updated 5 years ago
- Chromebackdoor is a PoC of pentest tool, this tool use a MITB technique for generate a windows executable ".exe" after launch run a malic…☆513Updated 8 years ago
- Sniffing browser history using HSTS☆933Updated 7 years ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆1,006Updated 3 years ago
- A command line tool to detect shared passwords☆402Updated 8 years ago
- WarBerryPi - Tactical Exploitation☆2,221Updated 5 years ago
- EternalRocks worm☆460Updated 8 years ago
- Various PoCs☆491Updated 5 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆1,369Updated 3 years ago
- Leaked Linux.Mirai Source Code for Research/IoC Development Purposes☆564Updated 8 years ago
- a more complex ransomware honeypot☆122Updated 9 years ago
- Tool to analyze and test security in IPv4 and IPv6 data networks☆770Updated 9 years ago
- KeySweeper is a stealthy Arduino-based device, camouflaged as a functioning USB wall charger, that wirelessly and passively sniffs, decry…☆1,114Updated 8 years ago
- DNS Exfiltration tool for stealthily sending files over DNS requests.☆1,702Updated 3 years ago
- A post-exploitation powershell tool for extracting juicy info from memory.☆1,847Updated last year
- peinjector - MITM PE file infector☆606Updated 9 years ago
- This is a POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing …☆586Updated 3 years ago
- ☆135Updated 9 years ago
- Zero-Day Code Injection and Persistence Technique☆1,237Updated 2 years ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,095Updated 6 years ago
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.☆344Updated 8 years ago
- Advanced Web Shell☆575Updated 8 years ago