CyberSecurityUP / Ransomware-CodesLinks
Educational repository with source code examples
☆12Updated 4 months ago
Alternatives and similar repositories for Ransomware-Codes
Users that are interested in Ransomware-Codes are comparing it to the libraries listed below
Sorting:
- Hacking with PasteJacking technique☆22Updated last year
- Ded Security Framework is a tool aimed at security professionals☆36Updated last year
- A tool designed to analyse email headers☆37Updated 3 years ago
- ☆28Updated 3 years ago
- Clipboard poisoning attack.☆58Updated 5 years ago
- Python-based web scraper for a darkweb marketplace on the Tor network.☆35Updated last year
- What is Phone Track? So phonetrack is a type of OSINT that is used to track someone's location just based on their telephone number☆79Updated 2 years ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆61Updated last year
- OSINT mapping using Twitter, Ficklr, Shodan and Insecam☆22Updated 2 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆50Updated last year
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆25Updated 4 years ago
- Collection of extra pentest tools for Kali Linux☆109Updated last month
- AI Powered Terminal Based Ethical Hacking Assistant☆81Updated 8 months ago
- CyberSec Resources: FRAMEWORKS & STANDARDS; Pentesting Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds, CTF, OSINT, Pentest tools,…☆28Updated 2 years ago
- DASH is deep osint Scanner. You just need username to start osint scan.☆50Updated 3 years ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engin…☆20Updated 3 years ago
- Hacking the Singularity. Deep learning hacking. Weaponizing AI in Offensive security☆104Updated last year
- Pentest/Red Team: Resources, repos and scripts.☆75Updated last week
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆64Updated 4 years ago
- It is a project produced to expose the main logic of OSINT-AI tools offered for sale on the DarkWeb☆35Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆35Updated 2 years ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆54Updated last year
- Chrome extension tool for OSINT & Recon☆56Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆46Updated last year
- PassBreaker☆63Updated last year
- Tool for bypassing logins vulnerable against SQL injection☆46Updated last year
- Bash script for CTF automating basic enumeration☆43Updated 3 years ago
- Herramienta de ingeniería social (Creador de puerta trasera con Reverse Shell para Windows/Android) con Ngrok.☆77Updated 2 years ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆80Updated last year
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆14Updated last year