AMEER-HAMZA-MAU / nekrosView external linksLinks
NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive KEY
☆13Jan 10, 2021Updated 5 years ago
Alternatives and similar repositories for nekros
Users that are interested in nekros are comparing it to the libraries listed below
Sorting:
- An open-source .NET Ransomware☆24Aug 2, 2021Updated 4 years ago
- Python-based vulnerability detection tool for web applications☆17Jul 31, 2024Updated last year
- Infect Android Phone☆10Jun 21, 2023Updated 2 years ago
- #Simple program to track someone by send malicious link☆13May 17, 2020Updated 5 years ago
- Script to Exploit Buffer_overflow (0)-Day vulnerability & executes the command remotely on target system.☆15Nov 7, 2020Updated 5 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆15Nov 10, 2020Updated 5 years ago
- #Just simple program to spoofing device by sending malicious link☆31Mar 1, 2022Updated 3 years ago
- WPA Attack - Easy breaking WPA WPA2 networks by typing one command☆21Jun 15, 2015Updated 10 years ago
- ☆13Apr 30, 2023Updated 2 years ago
- Facebook bot dumper&scraper☆39Oct 13, 2024Updated last year
- Reverse And Dorking Tools☆26Apr 30, 2021Updated 4 years ago
- Wifi network scanning tool for capturing WPA/WPA2 Handshakes☆27Jan 19, 2021Updated 5 years ago
- A web penetration testing framework !☆27Jun 10, 2023Updated 2 years ago
- Social Engineering Browser Update Attack.☆57Nov 12, 2023Updated 2 years ago
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆34Jan 18, 2026Updated 3 weeks ago
- Tool Bash para automatizar y penetrar fallas de SQL en sitios webs.☆28Jun 4, 2025Updated 8 months ago
- Knowledge Manager Agent for Claude Code - Extract and organize content from web, PDF, social media to Obsidian/Notion☆26Jan 19, 2026Updated 3 weeks ago
- first http brute force brute force any website we want☆30Dec 18, 2018Updated 7 years ago
- ☆26Dec 15, 2023Updated 2 years ago
- CloudFlare bypass, Breacher, FindPerson, GeneratorIP☆36Apr 9, 2023Updated 2 years ago
- Block excessive crawlers, bots and spiders traffic on your web site 👾☆34Jul 29, 2023Updated 2 years ago
- Comprehensive course materials for 'Linux for Cyber Security', covering everything from basic Linux fundamentals to advanced security pra…☆14Sep 28, 2024Updated last year
- rwwwshell: Getting a reverse shell with Mr. Robot ;)☆36Jul 16, 2020Updated 5 years ago
- Hacking Tool!! This Tools help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user discovery…☆16Dec 23, 2024Updated last year
- You can encode and decode base85, ascii85, base64, base32, and base16 with this tool.☆11Oct 4, 2023Updated 2 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆36Nov 16, 2023Updated 2 years ago
- Android gallery spyware☆11Feb 7, 2023Updated 3 years ago
- Python3 program that creates a duckyscript payload to brutforce a 4-digit pin on android. It uses an improved pin list to use most used p…☆17Nov 3, 2023Updated 2 years ago
- This tool will create a .exe file which will send you all the information of victim once the file executes!☆43Nov 24, 2024Updated last year
- ☆27Jan 19, 2026Updated 3 weeks ago
- 💥A TypeScript library that provides a comprehensive set of HTTP error classes and utilities for handling HTTP errors in your application…☆18Aug 9, 2025Updated 6 months ago
- Pegasus es un spyware instalado en dispositivos que ejecutan ciertas versiones de iOS (el sistema operativo móvil de Apple) y Android, de…☆13Aug 16, 2022Updated 3 years ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 6 months ago
- This is a repo for camphish tool for kali linux develop by thelinuxchoise and techchip☆10Nov 2, 2023Updated 2 years ago
- ☆11Dec 15, 2022Updated 3 years ago
- ☆10Nov 1, 2021Updated 4 years ago
- Doorbell replay attack using Arduino and HackRF One☆11Feb 15, 2021Updated 5 years ago
- This is an amazing tool using which you can download all tools for termux.☆39Sep 12, 2022Updated 3 years ago
- NetworkAssessment: Network Compromise Assessment Tool☆94May 31, 2024Updated last year