CyberSecurityUP / Ransomware-Codes
Educational repository with source code examples
☆12Updated last year
Alternatives and similar repositories for Ransomware-Codes:
Users that are interested in Ransomware-Codes are comparing it to the libraries listed below
- Hacking with PasteJacking technique☆22Updated 10 months ago
- A tool designed to analyse email headers☆33Updated 2 years ago
- Tool for bypassing logins vulnerable against SQL injection☆45Updated last year
- Simple Tool for webhacking☆11Updated 2 years ago
- List of OSINT resources☆15Updated 4 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆28Updated 4 years ago
- Ded Security Framework is a tool aimed at security professionals☆35Updated 11 months ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated last year
- A BASH Script to automate the installation of the most popular bug bounty tools☆19Updated 7 months ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆18Updated last year
- A bash and powershell script to download the latest version of Burp-Suite Professional and use it for free.☆17Updated last year
- Red Teaming Tactics and Techniques☆14Updated 3 years ago
- i will upload all the books that helped me in learning in this repo☆20Updated 2 years ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆16Updated 8 months ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆35Updated last year
- Who We Are☆19Updated 8 months ago
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆21Updated 2 years ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆60Updated last year
- VLAN attacks toolkit☆14Updated 2 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆32Updated 2 months ago
- crawl a website for links and expose all the vulnerable parameters.☆12Updated 2 years ago
- A single script to install important Pentesting Tools and wordlists on Debian based Linux OS.☆20Updated last week
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆44Updated 9 months ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engin…☆19Updated 3 years ago
- Hacking tool for enumeration and automated attacking. Port Scanner, Automatic SSH brute, DNS queries, IP and phonenumber geolocation☆14Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆60Updated 3 years ago
- DASH is deep osint Scanner. You just need username to start osint scan.☆48Updated 2 years ago
- OSCP_OSWA_OSED_OSEP_OSWE☆7Updated last year