ElevenPaths / Telefonica-WannaCry-FileRestorer-DesktopLinks
☆15Updated 8 years ago
Alternatives and similar repositories for Telefonica-WannaCry-FileRestorer-Desktop
Users that are interested in Telefonica-WannaCry-FileRestorer-Desktop are comparing it to the libraries listed below
Sorting:
- Tool to restore some WannaCry files which encryption weren't finish properly☆58Updated 8 years ago
- Metasploit Framework☆20Updated 8 years ago
- Python2 / BASH / VBS- UAC D&E Rubber Ducky☆68Updated 6 years ago
- NoobSecToolkit is a Python Based Tool kit that brings together powerful security and anonymity tools and scripts with predefined security…☆112Updated last year
- Repositorio donde compartimos con la comunidad scripts de bash relacionados con seguridad (parseadores, escáneres de vulnerabilidades, fo…☆61Updated 8 years ago
- Powershell Reverse Rubber Ducky☆56Updated 10 years ago
- Framework for Man-In-The-Middle attacks☆188Updated 8 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆189Updated 6 years ago
- ☆13Updated 9 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆223Updated 4 years ago
- Chat with hacker assistant☆194Updated 7 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆526Updated 8 years ago
- Advanced Hash Manipulation☆177Updated 5 years ago
- Script to generate malicious debian packages (debain trojans).☆119Updated 6 years ago
- Pythonic ransomware proof of concept.☆218Updated 5 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆374Updated 2 years ago
- ☆37Updated 5 years ago
- Bug7sec Team - ransomware open source (web)☆132Updated 7 years ago
- Fake sshd that logs ip addresses, usernames, and passwords.☆197Updated 8 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆60Updated 7 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆441Updated 8 years ago
- Reliable Teensy Penetration Testing Payload☆179Updated 12 years ago
- Collection of scripts to aid in delivering payloads via Office Macros. Most are python. See http://khr0x40sh.wordpress.com for details.☆408Updated 9 years ago
- Check if your computer is patched against EternalBlue☆15Updated 8 years ago
- Python Powered Repository☆16Updated 5 years ago
- Guides, Tools, Tips and such for working with the Shadow Brokers dumps☆234Updated 6 years ago
- ☆427Updated 7 years ago
- Metasploit AV Evasion Tool☆259Updated 9 years ago
- The Hacker's ToolBox☆188Updated 8 years ago
- The Credential Mapper☆445Updated 7 years ago