ElevenPaths / Telefonica-WannaCry-FileRestorer-DesktopLinks
☆16Updated 8 years ago
Alternatives and similar repositories for Telefonica-WannaCry-FileRestorer-Desktop
Users that are interested in Telefonica-WannaCry-FileRestorer-Desktop are comparing it to the libraries listed below
Sorting:
- Tool to restore some WannaCry files which encryption weren't finish properly☆58Updated 8 years ago
- ☆38Updated 5 years ago
- Metasploit Framework☆20Updated 8 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆190Updated 7 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆524Updated 8 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆225Updated 4 years ago
- Reliable Teensy Penetration Testing Payload☆182Updated 13 years ago
- Find your wireless network password in Windows , Linux and Mac OS☆355Updated 5 years ago
- Framework for Man-In-The-Middle attacks☆189Updated 8 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆442Updated 8 years ago
- Chat with hacker assistant☆194Updated 8 years ago
- Python2 / BASH / VBS- UAC D&E Rubber Ducky☆68Updated 7 years ago
- Bug7sec Team - ransomware open source (web)☆133Updated 8 years ago
- parrot website☆75Updated 5 years ago
- NoobSecToolkit is a Python Based Tool kit that brings together powerful security and anonymity tools and scripts with predefined security…☆114Updated last year
- Offensives network security framework for Wireless and MiTM style hacking☆61Updated 8 years ago
- The Hacker's ToolBox☆191Updated 8 years ago
- Guides, Tools, Tips and such for working with the Shadow Brokers dumps☆240Updated 7 years ago
- Trojanize your payload - WinRAR (SFX) automatization - under Linux distros☆292Updated 7 years ago
- ☆425Updated 8 years ago
- Collection of scripts to aid in delivering payloads via Office Macros. Most are python. See http://khr0x40sh.wordpress.com for details.☆409Updated 9 years ago
- Pythonic ransomware proof of concept.☆220Updated 5 years ago
- Powershell Reverse Rubber Ducky☆57Updated 10 years ago
- Advanced Hash Manipulation☆175Updated 6 years ago
- Metasploit AV Evasion Tool☆256Updated 10 years ago
- 🔓 A dynamic dictionary merger for successful dictionary based attacks.☆228Updated 4 years ago
- Linux bash script automation for metasploit☆269Updated 6 years ago
- Fake sshd that logs ip addresses, usernames, and passwords.☆200Updated 9 years ago
- Repositorio donde compartimos con la comunidad scripts de bash relacionados con seguridad (parseadores, escáneres de vulnerabilidades, fo…☆62Updated 8 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆339Updated last year