CyberSecurityUP / Ransomware-CodesLinks
Educational repository with source code examples
☆12Updated last year
Alternatives and similar repositories for Ransomware-Codes
Users that are interested in Ransomware-Codes are comparing it to the libraries listed below
Sorting:
- A bash and powershell script to download the latest version of Burp-Suite Professional and use it for free.☆17Updated 2 years ago
- Tool for bypassing logins vulnerable against SQL injection☆46Updated last year
- A single script to install important Pentesting Tools and wordlists on Debian based Linux OS.☆22Updated this week
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆22Updated 4 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆28Updated 4 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Updated 2 years ago
- Chrome extension tool for OSINT & Recon☆53Updated last year
- Hacking with PasteJacking technique☆22Updated 11 months ago
- Ded Security Framework is a tool aimed at security professionals☆35Updated last year
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engin…☆19Updated 3 years ago
- DASH is deep osint Scanner. You just need username to start osint scan.☆48Updated 2 years ago
- Dogma V1.5.3☆30Updated 5 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 3 years ago
- Who We Are☆19Updated 9 months ago
- A tool designed to analyse email headers☆34Updated 2 years ago
- OSINT mapping using Twitter, Ficklr, Shodan and Insecam☆23Updated 2 years ago
- Cookie - Phishing - Altri strumenti utili - Rendersi Anonimi nel WEB - Messaggistica Sicura☆21Updated last month
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆36Updated last year
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆40Updated 9 months ago
- CTF and Bug Bounty Hunting WriteUps.☆19Updated last month
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆56Updated last year
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆16Updated 10 months ago
- A BASH Script to automate the installation of the most popular bug bounty tools☆19Updated 8 months ago
- C2Matrix Automation☆11Updated last year
- Python-based web scraper for a darkweb marketplace on the Tor network.☆32Updated 8 months ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆15Updated last year
- crawl a website for links and expose all the vulnerable parameters.☆12Updated 2 years ago
- Subdomain Bruteforce - Bounty Quick Code☆30Updated 9 months ago
- nistrich allows you to discover CVEs and their severities belong to IP addresses☆13Updated 2 years ago
- Automated tool for domains & Subdomains Gathering☆13Updated last year