Busirus / PyQt5-RansomwareBuilderLinks
Introducing the Ransomware Builder – an educational tool with a sleek, modern GUI that makes it easy for anyone to create their own ransomware. Perfect for learning and awareness, our user-friendly interface guides you through each step, from customizing ransom notes to encrypting files, all with just a few clicks.
☆13Updated 10 months ago
Alternatives and similar repositories for PyQt5-RansomwareBuilder
Users that are interested in PyQt5-RansomwareBuilder are comparing it to the libraries listed below
Sorting:
- ☆14Updated 3 months ago
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆17Updated last year
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆18Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- web based c2 🏴☠️☆13Updated 10 months ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Updated 10 months ago
- A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticat…☆8Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆36Updated 2 years ago
- razorAP, Bash and Python tool used to generate Fake Access Points for Wi-Fi networks with 802.1X authentication.☆20Updated 9 months ago
- ☆25Updated 2 years ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆45Updated 7 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆23Updated 3 years ago
- Enumeration & fingerprint tool☆25Updated last year
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- simple program for joomla CVE-2023-23752 scanner for pentesting and educational purpose☆16Updated 2 years ago
- Code injection is a technique where a process can insert a part of or all of its code from its own running process into another target pr…☆14Updated 2 years ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆15Updated last year
- A PowerShell script that simplifies life and therefore... phishing.☆19Updated 2 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- Single-Clich-Proxy-Chains☆9Updated 4 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated 2 years ago
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)☆18Updated last year
- my mini collection of exploits and scripts for pentest☆12Updated 2 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆13Updated 2 years ago
- MacroExploit use in excel sheet☆20Updated 2 years ago
- Automate Blind SQL Injection with Python.☆23Updated 2 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- ☆14Updated last year