ElevenPaths / Telefonica-WannaCry-FileRestorer-DesktopLinks
☆16Updated 8 years ago
Alternatives and similar repositories for Telefonica-WannaCry-FileRestorer-Desktop
Users that are interested in Telefonica-WannaCry-FileRestorer-Desktop are comparing it to the libraries listed below
Sorting:
- Tool to restore some WannaCry files which encryption weren't finish properly☆58Updated 8 years ago
- Metasploit Framework☆20Updated 8 years ago
- SecurityTube Hack of the Day☆17Updated 12 years ago
- Repositorio donde compartimos con la comunidad scripts de bash relacionados con seguridad (parseadores, escáneres de vulnerabilidades, fo…☆62Updated 8 years ago
- Framework for Man-In-The-Middle attacks☆189Updated 8 years ago
- Python2 / BASH / VBS- UAC D&E Rubber Ducky☆68Updated 7 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆525Updated 8 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆190Updated 7 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆224Updated 4 years ago
- The Hacker's ToolBox☆190Updated 8 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆61Updated 8 years ago
- Pythonic ransomware proof of concept.☆220Updated 5 years ago
- NoobSecToolkit is a Python Based Tool kit that brings together powerful security and anonymity tools and scripts with predefined security…☆114Updated last year
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆439Updated 8 years ago
- ☆38Updated 5 years ago
- ☆81Updated 8 years ago
- Chat with hacker assistant☆196Updated 7 years ago
- search for hosts info with shodan☆231Updated 4 years ago
- Powershell Reverse Rubber Ducky☆57Updated 10 years ago
- Reliable Teensy Penetration Testing Payload☆181Updated 13 years ago
- The Credential Mapper☆448Updated 7 years ago
- Find your wireless network password in Windows , Linux and Mac OS☆355Updated 5 years ago
- Advanced Hash Manipulation☆176Updated 6 years ago
- Collection of scripts to aid in delivering payloads via Office Macros. Most are python. See http://khr0x40sh.wordpress.com for details.☆409Updated 9 years ago
- Metasploit AV Evasion Tool☆259Updated 9 years ago
- PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!☆256Updated 8 years ago
- Fake sshd that logs ip addresses, usernames, and passwords.☆199Updated 8 years ago
- Detect and prevent KRACK attacks in your network☆183Updated 8 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Updated 2 years ago
- Poison, reset, spoof, redirect MITM script☆127Updated 2 years ago