An encrypted notebook
☆33May 2, 2023Updated 2 years ago
Alternatives and similar repositories for Notebook
Users that are interested in Notebook are comparing it to the libraries listed below
Sorting:
- A Simple Keylogger☆17Oct 1, 2018Updated 7 years ago
- A Simple Ransomware☆52Jan 5, 2024Updated 2 years ago
- Discord Scripts☆12Nov 30, 2019Updated 6 years ago
- A simple Golang program to collect proxies☆13Aug 9, 2019Updated 6 years ago
- A Simple Proxy Scraper☆33Mar 18, 2019Updated 7 years ago
- Get or generate a password list☆128Jun 22, 2022Updated 3 years ago
- A URL shortener☆19Feb 4, 2019Updated 7 years ago
- Post-Auth RCE & Persistence on UOKOO Security Cameras☆13Nov 17, 2020Updated 5 years ago
- Remote Access Tool☆617May 1, 2023Updated 2 years ago
- Automatically Scans For Default Networks & Guess The Password☆14Dec 9, 2016Updated 9 years ago
- A Simple C&C Server Written In Python☆35Nov 6, 2018Updated 7 years ago
- A simple DOS attack tool☆14Sep 21, 2019Updated 6 years ago
- Disconnects client from router☆14Jul 28, 2017Updated 8 years ago
- A tool that finds and scan sites for sql injection vulnerability☆162Nov 22, 2019Updated 6 years ago
- A simple site cloner☆27Aug 20, 2017Updated 8 years ago
- Companion Worm research☆16Nov 8, 2021Updated 4 years ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- ☆10Sep 3, 2021Updated 4 years ago
- Babuk v2☆11Sep 28, 2021Updated 4 years ago
- 破解CS4.0☆16Feb 14, 2022Updated 4 years ago
- Secure FTP☆11Jul 28, 2018Updated 7 years ago
- Build myself for cs project☆12Oct 29, 2020Updated 5 years ago
- a phishing page☆14Aug 7, 2017Updated 8 years ago
- A simple phishing tool that can phish almost any website☆76Nov 6, 2018Updated 7 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Mar 10, 2022Updated 4 years ago
- Very Easy Relative Backdoor Application☆14Jun 8, 2021Updated 4 years ago
- Information Repository on Various Methods of getting shell access into a Windows machine☆17Feb 11, 2020Updated 6 years ago
- CVE-2020-14882 Weblogic-Exp☆17Oct 29, 2020Updated 5 years ago
- CVE-2021-22005批量验证python脚本☆13Sep 25, 2021Updated 4 years ago
- Evil twin tool.☆36Jul 26, 2021Updated 4 years ago
- Captive Portal Evasion Tool☆15Sep 4, 2016Updated 9 years ago
- jsc decrypt tool☆15Jul 17, 2020Updated 5 years ago
- CVE-2022-22963 Spring-Cloud-Function-SpEL_RCE_exploit☆15Mar 30, 2022Updated 3 years ago
- Ansible Cobalt Strike (Docker)☆15Jan 8, 2022Updated 4 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆23Dec 30, 2023Updated 2 years ago
- Reset Excel sheet and workbook protection☆10Jun 23, 2019Updated 6 years ago
- This is not a real botnet, this is suppose to show how botnets work, no virus, just simple python code.☆16Aug 13, 2017Updated 8 years ago
- Arduino based device for reading Mifare cards from a distance using RC522 module and an OLED display for portable reading of card data.☆20Nov 21, 2018Updated 7 years ago
- agent.btz download MALWARE BINARY PROVIDED + POC video☆20Jul 11, 2021Updated 4 years ago