zmallen / lollockerView external linksLinks
The third open source piece of ransomware using bash
☆15Aug 18, 2015Updated 10 years ago
Alternatives and similar repositories for lollocker
Users that are interested in lollocker are comparing it to the libraries listed below
Sorting:
- Simple Bash Rasomware for use in Cyber Exercises☆115Apr 3, 2016Updated 9 years ago
- PowerShell functions, scripts and modules☆15Dec 11, 2016Updated 9 years ago
- Fake SMB and SAMR data☆11Oct 27, 2019Updated 6 years ago
- ☆19Apr 29, 2015Updated 10 years ago
- A proof of concept to dump Django website's source code affected by NGINX's off-by-slash alias directive misconfiguration.☆24Dec 8, 2022Updated 3 years ago
- Clickjacking Proof-of-Concept Exploit☆25Oct 1, 2020Updated 5 years ago
- Powershell Persistence Locator☆66Sep 11, 2016Updated 9 years ago
- C# AV bypass jank☆33Feb 9, 2021Updated 5 years ago
- Automatically performs the SMB relay attack☆73May 13, 2016Updated 9 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- Bot simples para manter acesso em máquinas Windows.☆29Aug 6, 2015Updated 10 years ago
- Fileless Ransomware Example☆38Aug 2, 2017Updated 8 years ago
- The initial conversation slides and menu of scenarios☆38Jun 13, 2021Updated 4 years ago
- ☆41Jul 4, 2018Updated 7 years ago
- C&C Botnet written in Python with fabric☆36Jun 20, 2022Updated 3 years ago
- Kubernetes Scanner☆40Feb 14, 2022Updated 3 years ago
- The Art of the Steal / Deal - Made in Austria - Collection of Token White Papers on the Blockchain - Incl. Scam Alert - Thanks for your m…☆10Jan 2, 2021Updated 5 years ago
- ☆11Feb 21, 2016Updated 9 years ago
- Reverseshell Generator☆10Dec 13, 2017Updated 8 years ago
- This repository provides a Python package so everyone can easily try Computer Use of ClaudeAI.☆10Nov 1, 2024Updated last year
- Peer to Peer Payments via NFC - Built for IC Hack 2014☆10Dec 19, 2016Updated 9 years ago
- A minimal IRC server☆20Jul 27, 2024Updated last year
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- A collection of CyberChef recipes for decoding and decrypting strings in HTML attachments☆10Jul 10, 2024Updated last year
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- Tools for harvesting email addresses for phishing attacks |☆85Sep 9, 2015Updated 10 years ago
- PowerShell module containing all the PInvoke signatures published by Microsoft.☆44Apr 27, 2022Updated 3 years ago
- CVE-2018-6546-Exploit☆41Apr 15, 2018Updated 7 years ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆10Dec 3, 2020Updated 5 years ago
- top usernames from azure survey 2025☆14Apr 25, 2025Updated 9 months ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- ☆12May 1, 2023Updated 2 years ago
- Automated Real-Time Threat Hunting with ATD, Active Response and Elasticsearch/Kibana☆10Aug 17, 2018Updated 7 years ago
- McAfee Active Response (MAR) client library for use with the OpenDXL Python Client☆10Mar 17, 2020Updated 5 years ago
- Repo to host a comprehensive list of all my Public Gists with a short description for each item and a link to the Gist pages in question.…☆15Apr 27, 2021Updated 4 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- All combinations of various characters, to get the desired word☆18Dec 13, 2023Updated 2 years ago
- A Python module for Palo Alto Networks' WildFire API