An open-source .NET Ransomware
☆24Aug 2, 2021Updated 4 years ago
Alternatives and similar repositories for Cryptush
Users that are interested in Cryptush are comparing it to the libraries listed below
Sorting:
- NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive K…☆13Jan 10, 2021Updated 5 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆15Nov 10, 2020Updated 5 years ago
- ☆13Apr 30, 2023Updated 2 years ago
- Python-based vulnerability detection tool for web applications☆18Jul 31, 2024Updated last year
- Facebook bot dumper&scraper☆39Oct 13, 2024Updated last year
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆22Aug 4, 2020Updated 5 years ago
- Infect Android Phone☆10Jun 21, 2023Updated 2 years ago
- Tool Bash para automatizar y penetrar fallas de SQL en sitios webs.☆28Jun 4, 2025Updated 8 months ago
- This is a Simple reg Backdoor for Windows shell Hacking. You can fully compromise the target machine with this TOOL . For Advance backdoo…☆15Oct 26, 2020Updated 5 years ago
- ☆13May 20, 2023Updated 2 years ago
- ViperVenom is an open-source cyber offensive tool developed by Itay Funes for pentesters. ViperVenom is a great tool when it comes to pen…☆14Feb 2, 2022Updated 4 years ago
- #Simple program to track someone by send malicious link☆14May 17, 2020Updated 5 years ago
- Script to Exploit Buffer_overflow (0)-Day vulnerability & executes the command remotely on target system.☆15Nov 7, 2020Updated 5 years ago
- A lightweight and simple directory buster.☆16Sep 9, 2023Updated 2 years ago
- #Just simple program to spoofing device by sending malicious link☆31Mar 1, 2022Updated 4 years ago
- WPA Attack - Easy breaking WPA WPA2 networks by typing one command☆21Jun 15, 2015Updated 10 years ago
- A powerful password Brute Force password cracker for pentesting.☆41Feb 24, 2022Updated 4 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- Binaries Payloads Web Payloads Scripting Payloads Shellcode☆38Sep 6, 2018Updated 7 years ago
- Generate reverse shells in command line with Go !☆20Aug 9, 2020Updated 5 years ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆28Oct 3, 2025Updated 4 months ago
- Conti Ransomware Source Code☆19Mar 1, 2022Updated 4 years ago
- Source code of the Rensenware ransomware in .NET☆21Jul 24, 2021Updated 4 years ago
- Reversed source code of the Babuk Ransomware Version 1☆20May 3, 2021Updated 4 years ago
- ☆30Feb 24, 2022Updated 4 years ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Oct 31, 2023Updated 2 years ago
- Social Engineering Browser Update Attack.☆57Nov 12, 2023Updated 2 years ago
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.☆30Apr 14, 2023Updated 2 years ago
- This virus can destroy your computer :-)☆29Nov 15, 2020Updated 5 years ago
- An Automated Database Hacking Software with Database Dorks Hacking☆30Sep 7, 2019Updated 6 years ago
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆34Jan 18, 2026Updated last month
- ☆26Dec 15, 2023Updated 2 years ago
- Black-Tool v5.0.0 ⬛☆75Apr 4, 2024Updated last year
- CloudFlare bypass, Breacher, FindPerson, GeneratorIP☆36Apr 9, 2023Updated 2 years ago
- threejs risk-based heatmap☆12Aug 1, 2023Updated 2 years ago
- ip-keyloger☆10Jan 9, 2026Updated last month
- Block excessive crawlers, bots and spiders traffic on your web site 👾☆34Jul 29, 2023Updated 2 years ago
- Hacking Tool!! This Tools help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user discovery…☆16Dec 23, 2024Updated last year
- Custom variants for ULTRAKILL.☆12Jul 27, 2025Updated 7 months ago