CyberSecurityUP / Ransomware-Codes
Educational repository with source code examples
☆13Updated last year
Alternatives and similar repositories for Ransomware-Codes:
Users that are interested in Ransomware-Codes are comparing it to the libraries listed below
- Hacking with PasteJacking technique☆21Updated 8 months ago
- A bash and powershell script to download the latest version of Burp-Suite Professional and use it for free.☆16Updated last year
- Ded Security Framework is a tool aimed at security professionals☆34Updated 9 months ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆35Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated last year
- A tool designed to analyse email headers☆33Updated 2 years ago
- Tool for bypassing logins vulnerable against SQL injection☆44Updated 11 months ago
- OSINT mapping using Twitter, Ficklr, Shodan and Insecam☆23Updated last year
- Capture screenshots of onion services on an onion service.☆49Updated 8 months ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆57Updated 10 months ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆38Updated last year
- A single script to install important Pentesting Tools and wordlists on Debian based Linux OS.☆18Updated 2 weeks ago
- OSINT tool for username, email and domains☆27Updated 9 months ago
- Collection of extra pentest tools for Kali Linux☆103Updated last year
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Updated last year
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆27Updated last year
- A BASH Script to automate the installation of the most popular bug bounty tools☆18Updated 5 months ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆59Updated 3 years ago
- Retrieve all mails of users related to a git repository, a git user or a git organization☆46Updated 10 months ago
- Pentesting Tools to Automatize Active Directory Hacking☆17Updated 2 years ago
- medor is an OSINT tool that enables you to discover a WordPress website IP behind a WAF or behind Onion Services.☆14Updated 7 months ago
- Simple Tool for webhacking☆11Updated last year
- Intelligence and Reconnaissance Package/Bundle installer.☆27Updated 4 years ago
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆38Updated last year
- BlueTeam, RedTeam, Bug bounty, CTI, OSINT, Threat Hunting, Network and Web Recon, Discovery, Enumeration, Vulnerability Mapping, Exploita…☆54Updated this week
- FHook is a Command and Control server which allows an individual to accept connections from multiple remote clients via a remote access t…☆14Updated last year
- Chrome extension tool for OSINT & Recon☆52Updated 11 months ago
- DNSrecon tool with GUI for Kali Linux☆56Updated 2 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆18Updated last year
- Clipboard poisoning attack.☆56Updated 4 years ago