CyberSecurityUP / Ransomware-Codes
Educational repository with source code examples
☆13Updated last year
Alternatives and similar repositories for Ransomware-Codes:
Users that are interested in Ransomware-Codes are comparing it to the libraries listed below
- Capture screenshots of onion services on an onion service.☆50Updated 7 months ago
- Hacking with PasteJacking technique☆20Updated 6 months ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆58Updated 9 months ago
- A tool designed to analyse email headers☆33Updated 2 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆34Updated 6 months ago
- OSINT tool for username, email and domains☆27Updated 8 months ago
- Cookie - Phishing - Altri strumenti utili - Rendersi Anonimi nel WEB - Messaggistica Sicura☆20Updated 8 months ago
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆23Updated 3 years ago
- A single script to install important Pentesting Tools and wordlists on Debian based Linux OS.☆17Updated 3 weeks ago
- Extendable Python script handler for automating penetration testing.☆39Updated last year
- Herramienta de ingeniería social (Creador de puerta trasera con Reverse Shell para Windows/Android) con Ngrok.☆64Updated last year
- OSINT mapping using Twitter, Ficklr, Shodan and Insecam☆22Updated last year
- Python-based web scraper for a darkweb marketplace on the Tor network.☆25Updated 4 months ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆58Updated 3 years ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engin…☆17Updated 3 years ago
- i will upload all the books that helped me in learning in this repo☆20Updated 2 years ago
- razorAP, Bash and Python tool used to generate Fake Access Points for Wi-Fi networks with 802.1X authentication.☆20Updated 4 months ago
- Tool for bypassing logins vulnerable against SQL injection☆44Updated 9 months ago
- hashtray is an OSINT (Open Source Intelligence) tool designed to find a Gravatar account associated with an email address and to locate a…☆44Updated last month
- Mass bruteforce authentication of network protocols☆45Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- CTF and Bug Bounty Hunting WriteUps.☆19Updated 4 months ago
- C2Matrix Automation☆12Updated last year
- Intelligence and Reconnaissance Package/Bundle installer.☆27Updated 4 years ago
- Clipboard poisoning attack.☆55Updated 4 years ago
- Algunos #OSINT_TIPS para sus excelentes investigaciones en fuentes abiertas (#OSINT). Hello! I share some #OSINT_TIPS for your excellent …☆25Updated last year
- ☆27Updated 2 years ago
- Material i gathered for the Offensive Security Certified Professional OSCP☆14Updated 6 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆34Updated last year
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆13Updated last year