ElevenPaths / Telefonica-WannaCry-FileRestorer-DesktopLinks
☆15Updated 8 years ago
Alternatives and similar repositories for Telefonica-WannaCry-FileRestorer-Desktop
Users that are interested in Telefonica-WannaCry-FileRestorer-Desktop are comparing it to the libraries listed below
Sorting:
- Tool to restore some WannaCry files which encryption weren't finish properly☆59Updated 8 years ago
- ☆37Updated 5 years ago
- Metasploit Framework☆20Updated 8 years ago
- Repositorio donde compartimos con la comunidad scripts de bash relacionados con seguridad (parseadores, escáneres de vulnerabilidades, fo…☆61Updated 8 years ago
- ☆13Updated 9 years ago
- minimal script to help find script into the nse database☆131Updated 6 years ago
- Script (shell script) para automatizar escaneo de una red interna y ataque Man in the Middle☆7Updated 9 years ago
- Powershell Reverse Rubber Ducky☆55Updated 10 years ago
- Todos los scripts y locuras del Blog SniferL4bs que sean desarrollados vendran en esta pequeña sección dedicada☆21Updated last year
- Passive Vulnerability Auditor☆133Updated 8 years ago
- Yet another AV evasion tool☆119Updated 3 years ago
- A ctypes powered python keylogger.☆106Updated 5 years ago
- Useful pentesting scripts☆83Updated 4 months ago
- ☆105Updated 4 years ago
- WPS scan and pwn tool☆67Updated 5 years ago
- Script to generate malicious debian packages (debain trojans).☆118Updated 6 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆60Updated 7 years ago
- Advanced Hash Manipulation☆178Updated 5 years ago
- Veil Catapult is no longer supported☆76Updated 9 years ago
- NoobSecToolkit is a Python Based Tool kit that brings together powerful security and anonymity tools and scripts with predefined security…☆112Updated last year
- Analysis Suite For EAP Enabled Wireless Networks☆125Updated 6 years ago
- Simple backdoor written in .bat for windows that use NetCat☆18Updated 8 years ago
- Reverse Shell over TCP backdoor☆50Updated 6 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆98Updated 7 years ago
- Proof of Concept - Using squid url rewrite feature to "hijack" proxy traffic and inject BeEF payload into it.☆13Updated 10 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆61Updated 10 years ago
- Dionaea Front Web☆67Updated 7 years ago
- ☆50Updated 6 years ago
- Compilation of ready to run exploits, advisories, tools and online key generators for embedded devices.☆136Updated 9 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆57Updated 10 years ago