Clone of hidden tear written in C++
☆70Oct 18, 2020Updated 5 years ago
Alternatives and similar repositories for native-tear
Users that are interested in native-tear are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Removes any instance of jRAT on your machine☆18Dec 17, 2016Updated 9 years ago
- Gives medals to TOR relays☆10Jan 23, 2017Updated 9 years ago
- Forces Chrome to use HTTP Strict Transport Security on all HTTPS connections☆16Jan 7, 2023Updated 3 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- PoC grabbing IP address behind a VPN - Based of https://github.com/diafygi/webrtc-ips, saves all found addresses for anyone who visits wi…☆36Feb 14, 2016Updated 10 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Lists work items being queued currently.☆14Jun 7, 2015Updated 10 years ago
- Java library to easily detect running Operating System, BSD Flavor, Linux Distribution, Desktop Environment and Architecture☆29May 3, 2021Updated 4 years ago
- ☆28Apr 18, 2016Updated 9 years ago
- Terminal like Java Swing component with Bash formatting☆21Jul 9, 2015Updated 10 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- Changes MDM registry keys without the need for an MDM server to quickly disable WiFi-Sense and handle other potential security concerns i…☆15Aug 10, 2015Updated 10 years ago
- Simple PE packer with RtlCompressBuffer☆21Sep 20, 2015Updated 10 years ago
- ransomware open-sources☆794Jul 8, 2020Updated 5 years ago
- Cross platform PoC ransomware written in Go☆253Jan 21, 2017Updated 9 years ago
- Gmail Knocker☆23Jul 24, 2017Updated 8 years ago
- BitTorrent Tracker with upload & browsing, written on the 25th Chaos Communication Congress☆33Dec 25, 2013Updated 12 years ago
- an open source ransomware honeypot☆911Jan 27, 2016Updated 10 years ago
- Class implementation of PowerLoader injection technique☆32Dec 23, 2016Updated 9 years ago
- ☆84May 19, 2015Updated 10 years ago
- Uses InstallUtil.exe to load a compatible executable from a network share.☆12Mar 8, 2016Updated 10 years ago
- Various exploits, metasploit modules, etc.☆15Jun 3, 2016Updated 9 years ago
- Encrypted Memory Classloader loader + Builder☆46Aug 7, 2023Updated 2 years ago
- A simple native code virtualizer for 32-bit Windows PE☆15Jan 13, 2016Updated 10 years ago
- windows kernel File redirection☆20Sep 21, 2014Updated 11 years ago
- Kernel mode driver for writing to physical disk with SL_FORCE_DIRECT_WRITE☆26Aug 14, 2014Updated 11 years ago
- A OS X crypto ransomware PoC☆89Sep 4, 2015Updated 10 years ago
- WinEoP Exploitation Framework☆25Jan 7, 2016Updated 10 years ago
- KINS Banking Trojan☆65Feb 25, 2015Updated 11 years ago
- Automatically exported from code.google.com/p/pweb-suite☆14Jun 8, 2016Updated 9 years ago
- a more complex ransomware honeypot☆125Mar 27, 2016Updated 9 years ago
- Search Nmap and Metasploit scanning scripts.☆54Sep 18, 2017Updated 8 years ago
- Repo for the paper "USB Devices phoning home"☆22Feb 12, 2016Updated 10 years ago
- Fucking Search Engines Scraper - python library to scrap url's from search engines☆49Sep 6, 2017Updated 8 years ago
- ☆54Sep 10, 2016Updated 9 years ago
- Windows PE file debugger☆11Aug 30, 2017Updated 8 years ago
- Private set of tools for game hacking☆12Jan 25, 2015Updated 11 years ago
- Ring3 Rootkit Backdoor.☆42Jul 20, 2015Updated 10 years ago
- ☆23Feb 9, 2018Updated 8 years ago