CyberWarefare / OverviewLinks
Cyber Warfare is a free and open source international intrusion detection and prevention advisory
☆19Updated last year
Alternatives and similar repositories for Overview
Users that are interested in Overview are comparing it to the libraries listed below
Sorting:
- NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive K…☆121Updated last year
- A simple script to generate a hidden url for social engineering.☆122Updated 5 years ago
- ☆53Updated 4 years ago
- Argus Advanced Remote & Local Keylogger For macOS and Windows☆136Updated 2 years ago
- this FUD Payload☆39Updated 4 years ago
- Simple script masks the phishing link under the normal URL☆85Updated 4 years ago
- Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .☆45Updated 6 years ago
- extensible exploitation framework shipped on a modular multi-tasking architecture☆76Updated 3 years ago
- Virus for windows 100% FUD & bypass any AV☆24Updated 2 months ago
- Network Attack wifi attack vlan attack arp attack Mac Attack Attack revealed etc../☆142Updated 5 years ago
- Your eyes on the target - SPY☆25Updated 5 years ago
- Loki.Rat is a fork of the Ares RAT, it integrates new modules, like recording , lockscreen , and locate options. Loki.Rat is a Python Rem…☆76Updated 3 years ago
- Ro3b - Advance Banking HTTP Botnet☆51Updated 2 years ago
- Exploit toolkit☆58Updated 4 years ago
- An Android spyware which interacts with a remote C&C server to exfiltrate phone data☆76Updated 5 years ago
- Codes for malware, viruses and key-logger and other tools☆35Updated 4 years ago
- Python-based spyware for Windows that logs the foreground window activites, keyboard inputs. Furthermore it is able to take screenshots a…☆65Updated 6 years ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆64Updated 5 years ago
- Fully Undetectable Native C++ Remote Access Agent / Botnet.☆93Updated 5 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆119Updated 5 years ago
- Worm/Trojan/Ransomware/apt/Rootkit/Virus Database☆98Updated last year
- Python Script to Crack Zip Password with Dictionary attack and also use Crunch as Pipeline☆38Updated 7 years ago
- Usage of WH-HackerExploit Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsibility …☆39Updated 3 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆54Updated 4 years ago
- This is a keylogger that collects all the data and e-mail it in a set time with system information which includes device S/N and hardware…☆46Updated last month
- PhishX - The Complete Spear Phishing Tool☆110Updated 7 years ago
- EXXX EVASION | Metasploit Antivirus Evasion | Fully Undetectable Payloads☆29Updated 5 years ago
- A simple python script that spams a message on WhatsApp☆31Updated 3 years ago
- A web application which detects fake news using machine learning and natural language processing techniques.☆30Updated 4 years ago
- ⛤Keylogger Generator for Windows written in Python⛤☆55Updated 2 years ago