ElevenPaths / Telefonica-WannaCry-FileRestorer-DesktopLinks
☆16Updated 8 years ago
Alternatives and similar repositories for Telefonica-WannaCry-FileRestorer-Desktop
Users that are interested in Telefonica-WannaCry-FileRestorer-Desktop are comparing it to the libraries listed below
Sorting:
- Tool to restore some WannaCry files which encryption weren't finish properly☆58Updated 8 years ago
- Metasploit Framework☆20Updated 8 years ago
- Repositorio donde compartimos con la comunidad scripts de bash relacionados con seguridad (parseadores, escáneres de vulnerabilidades, fo…☆61Updated 8 years ago
- NoobSecToolkit is a Python Based Tool kit that brings together powerful security and anonymity tools and scripts with predefined security…☆114Updated last year
- A script written lazily for generating cross-platform backdoors on the go :)☆190Updated 6 years ago
- ☆37Updated 5 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆61Updated 7 years ago
- Framework for Man-In-The-Middle attacks☆189Updated 8 years ago
- Check if your computer is patched against EternalBlue☆15Updated 8 years ago
- The Hacker's ToolBox☆188Updated 8 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆222Updated 4 years ago
- Python2 / BASH / VBS- UAC D&E Rubber Ducky☆69Updated 6 years ago
- Fighting against ransomware using honeypots☆177Updated 3 years ago
- Find your wireless network password in Windows , Linux and Mac OS☆354Updated 4 years ago
- Chat with hacker assistant☆196Updated 7 years ago
- Reliable Teensy Penetration Testing Payload☆179Updated 13 years ago
- Pythonic ransomware proof of concept.☆217Updated 5 years ago
- ☆33Updated 8 years ago
- Metasploit AV Evasion Tool☆259Updated 9 years ago
- ☆13Updated 9 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆524Updated 8 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆441Updated 8 years ago
- A collection of tools for dealing with TrickBot☆202Updated 7 years ago
- Guides, Tools, Tips and such for working with the Shadow Brokers dumps☆234Updated 6 years ago
- Powershell Reverse Rubber Ducky☆56Updated 10 years ago
- Advanced Hash Manipulation☆176Updated 5 years ago
- Exploits and Security Tools Framework 2.0.1☆306Updated 3 years ago
- General tools and scripts i want to make public to the world.☆46Updated 6 years ago
- Compilation of ready to run exploits, advisories, tools and online key generators for embedded devices.☆138Updated 9 years ago
- Poison, reset, spoof, redirect MITM script☆128Updated 2 years ago