Anish-M-code / simple-gpg
A simple Commandline Program Developed Using Python3 to make GNU Privacy Guard Program easy to use for beginners.
☆10Updated 3 months ago
Alternatives and similar repositories for simple-gpg:
Users that are interested in simple-gpg are comparing it to the libraries listed below
- An opensource Prank Startup Malware for windows developed using C Programming Language.☆22Updated 4 years ago
- Script to create Onion Mirror for Clearnet site based on Enterprise Onion Toolkit☆14Updated 3 years ago
- A simple , secure , trustable and quantum safe password manager in Python3.☆9Updated 2 years ago
- A simple password manager using python☆8Updated 2 years ago
- Simple python file that sends victim ip,host name,location etc.., to your mail address☆14Updated 2 years ago
- Python script that automate the process of generating various reverse shells.☆15Updated 4 years ago
- the assembly shell and backdoor Trojan☆19Updated 3 years ago
- NetScan is a Network Reconnaissance Tool for Windows/Linux/OSx etc Written in Python 3.☆23Updated 4 years ago
- A keylogger that sends emails with log attachment - works on all OS☆12Updated 3 years ago
- A simple File Analysis Tool for Kali Linux☆16Updated 5 months ago
- Subdomain crawler with wordlist using python☆12Updated 5 years ago
- Scripts for hacking through wireless network [WiFi]☆23Updated 2 years ago
- AES Ransomware in batch☆11Updated 10 months ago
- ARP Poisoning/Spoofing using Scapy Python Library☆11Updated 2 years ago
- BruteForce SSH Login Credentials much Faster...!...Bring the Thunder of Asgard to SSH☆13Updated 11 months ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆15Updated last year
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Updated 3 years ago
- Hacking the Wifi Spy Tank YD-211S☆10Updated 5 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆16Updated 2 years ago
- An advanced keylogger with a GUI redirects traffic via TOR, designed to be executed on unix operating systems☆13Updated 4 years ago
- Intercept requests passively of DHCP from own network!☆12Updated 4 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 2 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 5 years ago
- A localhost implementation of a botnet used to perform a credential stuffing attack☆13Updated 4 years ago
- Python Keylogger PortScanner BruteForce and basic hack tools.(new ones will come soon)☆16Updated 4 years ago
- This program scans your network and finds mac addresses,ip addresses and company names of the devices☆11Updated 5 years ago
- KeplerPulse is a tool that generates a Powershell command that once executed on a Machine, Downloads and executes your desired Executable…☆10Updated 3 years ago
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆13Updated 4 years ago
- A tool to check for response status codes with ease☆14Updated last year
- Darkside Ransomware☆12Updated 3 years ago