Trending repositories for topic ransomware
🔒 Consolidating and extending hosts files from several well-curated sources. Optionally pick extensions for porn, social media, and other categories.
A resource containing all the tools each ransomware gangs uses
The Ultimate Unified Hosts file for protecting your network, computer, smartphones and Wi-Fi devices against millions of bad web sites. Protect your children and family from gaining access to bad web ...
WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target ser...
A collection of malware samples caught by several honeypots i manage
You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best ways of penetration. This is done in order to test and increas...
functions to exploit common web application vulnerabilities such as SQL Injection, Cross-Site Scripting (XSS), Server-Side Request Forgery (SSRF), and Path Traversal.
Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in a controlled setting.
Leaked pentesting manuals given to Conti ransomware crooks
WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target ser...
You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best ways of penetration. This is done in order to test and increas...
functions to exploit common web application vulnerabilities such as SQL Injection, Cross-Site Scripting (XSS), Server-Side Request Forgery (SSRF), and Path Traversal.
A resource containing all the tools each ransomware gangs uses
Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in a controlled setting.
The Ultimate Unified Hosts file for protecting your network, computer, smartphones and Wi-Fi devices against millions of bad web sites. Protect your children and family from gaining access to bad web ...
A collection of malware samples caught by several honeypots i manage
Leaked pentesting manuals given to Conti ransomware crooks
🔒 Consolidating and extending hosts files from several well-curated sources. Optionally pick extensions for porn, social media, and other categories.
🔒 Consolidating and extending hosts files from several well-curated sources. Optionally pick extensions for porn, social media, and other categories.
A resource containing all the tools each ransomware gangs uses
The Ultimate Unified Hosts file for protecting your network, computer, smartphones and Wi-Fi devices against millions of bad web sites. Protect your children and family from gaining access to bad web ...
Python Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles
A large repository of malware samples with 2500+ malware samples & source codes for a variety of platforms by Cryptware Apps.
Improve your security and privacy by blocking ads, tracking and malware domains.
A collection of malware samples caught by several honeypots i manage
functions to exploit common web application vulnerabilities such as SQL Injection, Cross-Site Scripting (XSS), Server-Side Request Forgery (SSRF), and Path Traversal.
Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in a controlled setting.
A Python Hacking Library consisting of network scanner, arp spoofer and detector, dns spoofer, code injector, packet sniffer, network jammer, email sender, downloader, wireless password harvester cred...
Let's make an annoyance free, better open internet, altogether!
functions to exploit common web application vulnerabilities such as SQL Injection, Cross-Site Scripting (XSS), Server-Side Request Forgery (SSRF), and Path Traversal.
A resource containing all the tools each ransomware gangs uses
𓆰𓆪 WannaCry 𝗥𝗮𝗻𝘀𝗼𝗺𝘄𝗮𝗿𝗲. This malware spread by using a vulnerability Exploit Called "EternalBlue".
WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target ser...
You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best ways of penetration. This is done in order to test and increas...
VAIM-RAMSOM IS A SIMPLE ANDROID RANSOMWARE FOR PRANK WITH YOUR FRIENDS. MANY TIMES YOU JUST WANT TO PRANK OR PLAY ON YOUR FRIEND. IF YOU FIND YOURSELF IN THAT SITUATION THEN THIS TOOL IS PERFECT FOR Y...
Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in a controlled setting.
PHP ransomware that encrypts your files, as well as file and directory names.
Linux Malware Sample Archive including various types of malicious ELF binaries and viruses. Be careful!
The Ultimate Unified Hosts file for protecting your network, computer, smartphones and Wi-Fi devices against millions of bad web sites. Protect your children and family from gaining access to bad web ...
Python Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles
🔒 Consolidating and extending hosts files from several well-curated sources. Optionally pick extensions for porn, social media, and other categories.
Improve your security and privacy by blocking ads, tracking and malware domains.
A resource containing all the tools each ransomware gangs uses
Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups and evolving to other types of threats.
The Ultimate Unified Hosts file for protecting your network, computer, smartphones and Wi-Fi devices against millions of bad web sites. Protect your children and family from gaining access to bad web ...
🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware threats😈, analysis and mitigation🧐.
A collection of malware samples caught by several honeypots i manage
LimeRAT | Simple, yet powerful remote administration tool for Windows (RAT)
A Python Hacking Library consisting of network scanner, arp spoofer and detector, dns spoofer, code injector, packet sniffer, network jammer, email sender, downloader, wireless password harvester cred...
A large repository of malware samples with 2500+ malware samples & source codes for a variety of platforms by Cryptware Apps.
Let's make an annoyance free, better open internet, altogether!
Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups and evolving to other types of threats.
Z-Ransom (Create Android Ransomware In Kali linux and Termux (NO ROOT)
Android malware source code dataset collected from public resources.
USB Ransomware, will encrypt SOME files and steal some, you can change what it steals... once its done, just unplug it from the PC u plugged it in. (some source code)
A resource containing all the tools each ransomware gangs uses
𓆰𓆪 WannaCry 𝗥𝗮𝗻𝘀𝗼𝗺𝘄𝗮𝗿𝗲. This malware spread by using a vulnerability Exploit Called "EternalBlue".
VAIM-RAMSOM IS A SIMPLE ANDROID RANSOMWARE FOR PRANK WITH YOUR FRIENDS. MANY TIMES YOU JUST WANT TO PRANK OR PLAY ON YOUR FRIEND. IF YOU FIND YOURSELF IN THAT SITUATION THEN THIS TOOL IS PERFECT FOR Y...
Improve your security and privacy by blocking ads, tracking and malware domains.
A simple, fully python ransomware PoC using AES-CTR and RSA. Supports Windows, Linux and macOS
functions to exploit common web application vulnerabilities such as SQL Injection, Cross-Site Scripting (XSS), Server-Side Request Forgery (SSRF), and Path Traversal.
A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense
WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target ser...
ساخت پروفایل برای وصل انتن ایفون بدون رجیستر 🦹♀️ Configuration Profile Generator
𓆰𓆪 WannaCry 𝗥𝗮𝗻𝘀𝗼𝗺𝘄𝗮𝗿𝗲. This malware spread by using a vulnerability Exploit Called "EternalBlue".
[ICSE'24] Latest 7,796 active and unique ransomware samples from 95 families. Code is in another repository. 勒索软件数据破坏攻击分析
🔒 Consolidating and extending hosts files from several well-curated sources. Optionally pick extensions for porn, social media, and other categories.
A resource containing all the tools each ransomware gangs uses
Improve your security and privacy by blocking ads, tracking and malware domains.
The Ultimate Unified Hosts file for protecting your network, computer, smartphones and Wi-Fi devices against millions of bad web sites. Protect your children and family from gaining access to bad web ...
A Python Hacking Library consisting of network scanner, arp spoofer and detector, dns spoofer, code injector, packet sniffer, network jammer, email sender, downloader, wireless password harvester cred...
A collection of malware samples caught by several honeypots i manage
🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware threats😈, analysis and mitigation🧐.
A large repository of malware samples with 2500+ malware samples & source codes for a variety of platforms by Cryptware Apps.
An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz
Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups and evolving to other types of threats.
WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target ser...
ساخت پروفایل برای وصل انتن ایفون بدون رجیستر 🦹♀️ Configuration Profile Generator
A resource containing all the tools each ransomware gangs uses
🐝 Ransomware Detection using Machine Learning with eBPF for Linux.
You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best ways of penetration. This is done in order to test and increas...
Android malware source code dataset collected from public resources.
A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense
USB Ransomware, will encrypt SOME files and steal some, you can change what it steals... once its done, just unplug it from the PC u plugged it in. (some source code)
Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups and evolving to other types of threats.
Comprehensive domain blocklists for 🚨 threats (🕷malware, 🎣phishing, 🕵️spyware, 🤖botnets). Ideal for DNS-based filtering tools like Pi-Hole, AdGuard Home, Blocky.