ElevenPaths / Telefonica-WannaCry-FileRestorer-DesktopLinks
☆16Updated 8 years ago
Alternatives and similar repositories for Telefonica-WannaCry-FileRestorer-Desktop
Users that are interested in Telefonica-WannaCry-FileRestorer-Desktop are comparing it to the libraries listed below
Sorting:
- Tool to restore some WannaCry files which encryption weren't finish properly☆58Updated 8 years ago
- Metasploit Framework☆20Updated 8 years ago
- Reliable Teensy Penetration Testing Payload☆179Updated 12 years ago
- Repositorio donde compartimos con la comunidad scripts de bash relacionados con seguridad (parseadores, escáneres de vulnerabilidades, fo…☆61Updated 8 years ago
- Check if your computer is patched against EternalBlue☆15Updated 8 years ago
- ☆37Updated 5 years ago
- Metasploit AV Evasion Tool☆259Updated 9 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆190Updated 6 years ago
- Python2 / BASH / VBS- UAC D&E Rubber Ducky☆68Updated 6 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆60Updated 7 years ago
- A python2 script for processing a PCAP file to decrypt C2 traffic sent to DOUBLEPULSAR implant☆225Updated 8 years ago
- ☆81Updated 8 years ago
- NoobSecToolkit is a Python Based Tool kit that brings together powerful security and anonymity tools and scripts with predefined security…☆113Updated last year
- Chat with hacker assistant☆194Updated 7 years ago
- The Hacker's ToolBox☆188Updated 8 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆222Updated 4 years ago
- Poison, reset, spoof, redirect MITM script☆128Updated 2 years ago
- Bug7sec Team - ransomware open source (web)☆132Updated 7 years ago
- Powershell Reverse Rubber Ducky☆56Updated 10 years ago
- Pythonic ransomware proof of concept.☆217Updated 5 years ago
- Fake sshd that logs ip addresses, usernames, and passwords.☆197Updated 8 years ago
- Veil-Pillage is a post-exploitation framework that integrates with Veil-Evasion.☆158Updated 9 years ago
- SecurityTube Hack of the Day☆17Updated 12 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆440Updated 8 years ago
- A collection of tools for dealing with TrickBot☆202Updated 7 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆372Updated 2 years ago
- Collection of scripts to aid in delivering payloads via Office Macros. Most are python. See http://khr0x40sh.wordpress.com for details.☆407Updated 9 years ago
- Find your wireless network password in Windows , Linux and Mac OS☆353Updated 4 years ago
- Unveiled at DEF CON 20, NTLM Relaying to ALL THE THINGS!☆259Updated 9 years ago
- search for hosts info with shodan☆232Updated 4 years ago