The third open source piece of ransomware using bash
☆15Aug 18, 2015Updated 10 years ago
Alternatives and similar repositories for lollocker
Users that are interested in lollocker are comparing it to the libraries listed below
Sorting:
- Simple Bash Rasomware for use in Cyber Exercises☆116Apr 3, 2016Updated 9 years ago
- Fake SMB and SAMR data☆11Oct 27, 2019Updated 6 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Jun 19, 2018Updated 7 years ago
- ☆19Apr 29, 2015Updated 10 years ago
- A proof of concept to dump Django website's source code affected by NGINX's off-by-slash alias directive misconfiguration.☆24Dec 8, 2022Updated 3 years ago
- Clickjacking Proof-of-Concept Exploit☆25Oct 1, 2020Updated 5 years ago
- ⭕️💰 Network monitoring solution to detect crypto-mining on local machines.☆31Jun 27, 2018Updated 7 years ago
- Powershell Persistence Locator☆66Sep 11, 2016Updated 9 years ago
- OSINT Browser Plugins☆38Jun 9, 2017Updated 8 years ago
- Lightweight TCP botnet coded in C++☆27Jul 22, 2018Updated 7 years ago
- Bot simples para manter acesso em máquinas Windows.☆29Aug 6, 2015Updated 10 years ago
- Automatically performs the SMB relay attack☆73May 13, 2016Updated 9 years ago
- Competition Infrastructure Management☆13Oct 16, 2025Updated 4 months ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆37Mar 24, 2014Updated 11 years ago
- The initial conversation slides and menu of scenarios☆38Jun 13, 2021Updated 4 years ago
- Fileless Ransomware Example☆38Aug 2, 2017Updated 8 years ago
- dnmap revised (dnmapR) is a modernized and enhanced version of dnmap☆34Jan 22, 2019Updated 7 years ago
- C&C Botnet written in Python with fabric☆36Jun 20, 2022Updated 3 years ago
- Kubernetes Scanner☆40Feb 14, 2022Updated 4 years ago
- ☆41Jul 4, 2018Updated 7 years ago
- Discover, setup, and get stats on network interfaces☆11Nov 17, 2023Updated 2 years ago
- A collection of CyberChef recipes for decoding and decrypting strings in HTML attachments☆10Jul 10, 2024Updated last year
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- ☆20Feb 28, 2026Updated last week
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- Peer to Peer Payments via NFC - Built for IC Hack 2014☆10Dec 19, 2016Updated 9 years ago
- MagicMirror plug-in module that displays a table of MySQL SELECT results☆10Jan 5, 2026Updated 2 months ago
- A repo of fake committed secrets to test tools that find committed secrets ([dont submit for BB :-) ]☆10Mar 22, 2018Updated 7 years ago
- A minimal IRC server☆20Jul 27, 2024Updated last year
- This repository provides a Python package so everyone can easily try Computer Use of ClaudeAI.☆10Nov 1, 2024Updated last year
- Tools for harvesting email addresses for phishing attacks |☆85Sep 9, 2015Updated 10 years ago
- The Art of the Steal / Deal - Made in Austria - Collection of Token White Papers on the Blockchain - Incl. Scam Alert - Thanks for your m…☆10Jan 2, 2021Updated 5 years ago
- CVE-2018-6546-Exploit☆41Apr 15, 2018Updated 7 years ago
- An Android wrapper for Arc☆11May 13, 2018Updated 7 years ago
- Android project 1st bachelor Engineering/CS☆14Feb 2, 2012Updated 14 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated 2 months ago
- Go - Simple TCP/HTTP Load Balancer☆12Mar 11, 2014Updated 11 years ago
- Uptime checker for tor hidden services☆12Feb 14, 2018Updated 8 years ago
- ☆10May 30, 2015Updated 10 years ago