ElevenPaths / Telefonica-WannaCry-FileRestorer-Desktop
☆16Updated 7 years ago
Alternatives and similar repositories for Telefonica-WannaCry-FileRestorer-Desktop:
Users that are interested in Telefonica-WannaCry-FileRestorer-Desktop are comparing it to the libraries listed below
- Tool to restore some WannaCry files which encryption weren't finish properly☆60Updated 7 years ago
- ☆37Updated 4 years ago
- Proyecto sobre cómo crear tu propio Shodan de casa con algunas mejoras.☆35Updated 8 years ago
- Repositorio donde compartimos con la comunidad scripts de bash relacionados con seguridad (parseadores, escáneres de vulnerabilidades, fo…☆61Updated 7 years ago
- Metasploit Framework☆20Updated 7 years ago
- Script to generate malicious debian packages (debain trojans).☆118Updated 5 years ago
- ☆13Updated 8 years ago
- minimal script to help find script into the nse database☆130Updated 6 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆437Updated 7 years ago
- Useful pentesting scripts☆83Updated last month
- ☆104Updated 3 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆185Updated 6 years ago
- Python2 / BASH / VBS- UAC D&E Rubber Ducky☆60Updated 6 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆61Updated 9 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆223Updated 3 years ago
- Script (shell script) para automatizar escaneo de una red interna y ataque Man in the Middle☆7Updated 8 years ago
- Advanced Hash Manipulation☆176Updated 5 years ago
- The Hacker's ToolBox☆186Updated 7 years ago
- Exploit the hack for IOS 11.1.2 and earlier to collect leaked information.☆82Updated 7 years ago
- Tool to automatic leak information using Hacking with engine searches☆92Updated 6 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆283Updated 5 years ago
- Powershell Reverse Rubber Ducky☆55Updated 9 years ago
- Traffic monitor for your VPN☆29Updated 8 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Updated 7 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆166Updated 5 years ago
- Framework for Man-In-The-Middle attacks☆185Updated 7 years ago
- Some of my day-to-day use scripts☆16Updated 4 years ago
- Simple Bash Rasomware for use in Cyber Exercises☆115Updated 8 years ago
- search for hosts info with shodan☆230Updated 3 years ago
- Passive Vulnerability Auditor☆130Updated 8 years ago