utkusen / hidden-tear
an open source ransomware honeypot
☆901Updated 9 years ago
Alternatives and similar repositories for hidden-tear:
Users that are interested in hidden-tear are comparing it to the libraries listed below
- a more complex ransomware honeypot☆122Updated 8 years ago
- A PoC backdoor that uses Gmail as a C&C server☆1,327Updated 6 years ago
- A fast and stealthy credential harvester☆623Updated last year
- Extracts passwords from a KeePass 2.x database, directly from memory.☆1,004Updated 9 years ago
- wireless hacking - This is automated wireless hacking tool☆1,251Updated 2 years ago
- Advanced CPU-based password recovery utility☆2,142Updated 2 years ago
- A fully featured backdoor that uses Twitter as a C&C server☆772Updated 4 years ago
- Chromebackdoor is a PoC of pentest tool, this tool use a MITB technique for generate a windows executable ".exe" after launch run a malic…☆507Updated 8 years ago
- A python2 script for sweeping a network to find windows systems compromised with the DOUBLEPULSAR implant.☆1,026Updated 5 years ago
- EternalRocks worm☆453Updated 7 years ago
- WarBerryPi - Tactical Exploitation☆2,223Updated 5 years ago
- Inject code and spy on wifi users☆2,593Updated 3 years ago
- powerful auto-backdooring utility☆746Updated 7 years ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,500Updated 7 years ago
- Malcom - Malware Communications Analyzer☆1,157Updated 7 years ago
- Automated wanadecrypt with key recovery if lucky☆789Updated 7 years ago
- Various PoCs☆490Updated 5 years ago
- A command line tool to detect shared passwords☆402Updated 8 years ago
- Command line utility for searching and downloading exploits☆1,752Updated 9 months ago
- ransomware open-sources☆755Updated 4 years ago
- A tool to retrieve malware directly from the source for security researchers.☆562Updated 7 years ago
- Sniffing browser history using HSTS☆936Updated 7 years ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,089Updated 6 years ago
- All your IPs are belong to us.☆669Updated 6 years ago
- ☆1,331Updated last year
- Zero-Day Code Injection and Persistence Technique☆1,224Updated 2 years ago
- Veil Evasion is no longer supported, use Veil 3.0!☆1,833Updated 3 years ago
- A system automation and configuration management stack targeted toward operational flexibility and policy compliance.☆1,336Updated 5 years ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆996Updated 3 years ago
- Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE …☆301Updated 3 years ago