zmallen / lollockerView external linksLinks
The third open source piece of ransomware using bash
☆15Aug 18, 2015Updated 10 years ago
Alternatives and similar repositories for lollocker
Users that are interested in lollocker are comparing it to the libraries listed below
Sorting:
- Simple Bash Rasomware for use in Cyber Exercises☆115Apr 3, 2016Updated 9 years ago
- PowerShell functions, scripts and modules☆15Dec 11, 2016Updated 9 years ago
- Fake SMB and SAMR data☆11Oct 27, 2019Updated 6 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Jun 19, 2018Updated 7 years ago
- ☆19Apr 29, 2015Updated 10 years ago
- A proof of concept to dump Django website's source code affected by NGINX's off-by-slash alias directive misconfiguration.☆24Dec 8, 2022Updated 3 years ago
- Clickjacking Proof-of-Concept Exploit☆25Oct 1, 2020Updated 5 years ago
- ⭕️💰 Network monitoring solution to detect crypto-mining on local machines.☆31Jun 27, 2018Updated 7 years ago
- Lightweight TCP botnet coded in C++☆27Jul 22, 2018Updated 7 years ago
- OSINT Browser Plugins☆38Jun 9, 2017Updated 8 years ago
- Automatically performs the SMB relay attack☆73May 13, 2016Updated 9 years ago
- Competition Infrastructure Management☆13Oct 16, 2025Updated 3 months ago
- The initial conversation slides and menu of scenarios☆38Jun 13, 2021Updated 4 years ago
- dnmap revised (dnmapR) is a modernized and enhanced version of dnmap☆34Jan 22, 2019Updated 7 years ago
- Fileless Ransomware Example☆38Aug 2, 2017Updated 8 years ago
- Kubernetes Scanner☆40Feb 14, 2022Updated 4 years ago
- C&C Botnet written in Python with fabric☆36Jun 20, 2022Updated 3 years ago
- ☆41Jul 4, 2018Updated 7 years ago
- Peer to Peer Payments via NFC - Built for IC Hack 2014☆10Dec 19, 2016Updated 9 years ago
- The Art of the Steal / Deal - Made in Austria - Collection of Token White Papers on the Blockchain - Incl. Scam Alert - Thanks for your m…☆10Jan 2, 2021Updated 5 years ago
- Tools for harvesting email addresses for phishing attacks |☆85Sep 9, 2015Updated 10 years ago
- A collection of CyberChef recipes for decoding and decrypting strings in HTML attachments☆10Jul 10, 2024Updated last year
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- Reverseshell Generator☆10Dec 13, 2017Updated 8 years ago
- A repo of fake committed secrets to test tools that find committed secrets ([dont submit for BB :-) ]☆10Mar 22, 2018Updated 7 years ago
- This repository provides a Python package so everyone can easily try Computer Use of ClaudeAI.☆10Nov 1, 2024Updated last year
- Discover, setup, and get stats on network interfaces☆11Nov 17, 2023Updated 2 years ago
- ☆20Jan 26, 2026Updated 2 weeks ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- ☆11Feb 21, 2016Updated 9 years ago
- PowerShell module containing all the PInvoke signatures published by Microsoft.☆44Apr 27, 2022Updated 3 years ago
- CVE-2018-6546-Exploit☆41Apr 15, 2018Updated 7 years ago
- A Python module for Palo Alto Networks' WildFire API☆11Feb 18, 2020Updated 5 years ago
- Raft transport layer that implements the Redis protocol☆15Nov 3, 2020Updated 5 years ago
- ☆10Dec 16, 2024Updated last year
- From my YouTube Tutorial "How to create a flooder with python adn twilio☆10Mar 1, 2018Updated 7 years ago
- Analizador de tráfico para dispositivos Android potencialmente comprometidos como parte de una botnet orientado a detectar ataques DDoS.☆13Jun 20, 2018Updated 7 years ago
- Go - Simple TCP/HTTP Load Balancer☆12Mar 11, 2014Updated 11 years ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆10Dec 3, 2020Updated 5 years ago