utkusen / hidden-tear
an open source ransomware honeypot
☆901Updated 9 years ago
Alternatives and similar repositories for hidden-tear:
Users that are interested in hidden-tear are comparing it to the libraries listed below
- A PoC backdoor that uses Gmail as a C&C server☆1,331Updated 6 years ago
- A fully featured backdoor that uses Twitter as a C&C server☆771Updated 4 years ago
- A fast and stealthy credential harvester☆623Updated last year
- Advanced CPU-based password recovery utility☆2,149Updated 2 years ago
- Chromebackdoor is a PoC of pentest tool, this tool use a MITB technique for generate a windows executable ".exe" after launch run a malic…☆509Updated 8 years ago
- WarBerryPi - Tactical Exploitation☆2,223Updated 5 years ago
- Extracts passwords from a KeePass 2.x database, directly from memory.☆1,009Updated 9 years ago
- A post-exploitation powershell tool for extracting juicy info from memory.☆1,840Updated 9 months ago
- A python2 script for sweeping a network to find windows systems compromised with the DOUBLEPULSAR implant.☆1,025Updated 5 years ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,501Updated 7 years ago
- powerful auto-backdooring utility☆746Updated 7 years ago
- KeySweeper is a stealthy Arduino-based device, camouflaged as a functioning USB wall charger, that wirelessly and passively sniffs, decry…☆1,109Updated 8 years ago
- This is a POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing …☆582Updated 3 years ago
- Anonymize and fracture network traffic/Internet access over a point-to-point wireless link or through TCP->GSM->wifi tunnel (advanced res…☆355Updated 9 years ago
- a more complex ransomware honeypot☆122Updated 9 years ago
- Various PoCs☆491Updated 5 years ago
- ☆135Updated 9 years ago
- A command line tool to detect shared passwords☆402Updated 8 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,668Updated 5 years ago
- Pre-migration repository. New repository ➙☆859Updated 7 years ago
- A web front-end for password cracking and analytics☆624Updated 3 years ago
- Zero-Day Code Injection and Persistence Technique☆1,227Updated 2 years ago
- ransomware open-sources☆763Updated 4 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a cross-platform firewall-evading backdoo…☆1,248Updated 8 years ago
- A list of all FTP servers in IPv4 that allow anonymous logins.☆654Updated 4 months ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,091Updated 6 years ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆275Updated 9 years ago
- BrowserBackdoor is an Electron Application with a JavaScript WebSocket Backdoor and a Ruby Command-Line Listener☆342Updated 2 years ago
- wireless hacking - This is automated wireless hacking tool☆1,252Updated 2 years ago
- Poc, Presentation of Monitor OSD Exploitation, and shenanigans of high quality.☆910Updated 7 years ago