Clone of hidden tear written in C++
☆70Oct 18, 2020Updated 5 years ago
Alternatives and similar repositories for native-tear
Users that are interested in native-tear are comparing it to the libraries listed below
Sorting:
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Removes any instance of jRAT on your machine☆18Dec 17, 2016Updated 9 years ago
- Gmail Knocker☆23Jul 24, 2017Updated 8 years ago
- WinEoP Exploitation Framework☆25Jan 7, 2016Updated 10 years ago
- Simple PE packer with RtlCompressBuffer☆21Sep 20, 2015Updated 10 years ago
- Changes MDM registry keys without the need for an MDM server to quickly disable WiFi-Sense and handle other potential security concerns i…☆15Aug 10, 2015Updated 10 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- Fucking Search Engines Scraper - python library to scrap url's from search engines☆49Sep 6, 2017Updated 8 years ago
- windows kernel File redirection☆20Sep 21, 2014Updated 11 years ago
- Private set of tools for game hacking☆12Jan 25, 2015Updated 11 years ago
- Cross platform PoC ransomware written in Go☆253Jan 21, 2017Updated 9 years ago
- ☆84May 19, 2015Updated 10 years ago
- ransomware open-sources☆795Jul 8, 2020Updated 5 years ago
- Search Nmap and Metasploit scanning scripts.☆54Sep 18, 2017Updated 8 years ago
- ☆28Apr 18, 2016Updated 9 years ago
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆27May 14, 2016Updated 9 years ago
- Some kernel exploit i wrote☆77Jan 9, 2015Updated 11 years ago
- a more complex ransomware honeypot☆126Mar 27, 2016Updated 9 years ago
- an open source ransomware honeypot☆908Jan 27, 2016Updated 10 years ago
- 🛡 Monitor, analyze, & report security misconfigurations across environments.☆18Oct 26, 2017Updated 8 years ago
- Class implementation of PowerLoader injection technique☆32Dec 23, 2016Updated 9 years ago
- ☆27May 29, 2015Updated 10 years ago
- PoC grabbing IP address behind a VPN - Based of https://github.com/diafygi/webrtc-ips, saves all found addresses for anyone who visits wi…☆36Feb 14, 2016Updated 10 years ago
- Exploitkit☆188Dec 10, 2016Updated 9 years ago
- Forces Chrome to use HTTP Strict Transport Security on all HTTPS connections☆16Jan 7, 2023Updated 3 years ago
- XSS payload designed to steal LastPass users' credentials☆16Apr 25, 2014Updated 11 years ago
- A OS X crypto ransomware PoC☆89Sep 4, 2015Updated 10 years ago
- KINS Banking Trojan☆65Feb 25, 2015Updated 11 years ago
- Acunetix 0day RCE☆193May 2, 2016Updated 9 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Apr 12, 2017Updated 8 years ago
- Ring3 Rootkit Backdoor.☆43Jul 20, 2015Updated 10 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Nov 12, 2016Updated 9 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆47Jan 19, 2018Updated 8 years ago
- A simple native code virtualizer for 32-bit Windows PE☆15Jan 13, 2016Updated 10 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- Athena Botnet Source Code☆155Sep 25, 2015Updated 10 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 4 years ago