VedantGawade / Uzi
A Distinctive Ransomeware.
☆27Updated 8 years ago
Related projects: ⓘ
- Library to crawl and extract internal links from domain☆26Updated 6 years ago
- A simple PoC crypto ransomware in Python☆16Updated 8 years ago
- Python code to extract chrome cookie, history and login data files☆58Updated 6 years ago
- Advanced Hash Manipulation☆172Updated 4 years ago
- A Python Python Google-YouTube History Analytics, which reads your history data you get from Google and provide analytics about your sear…☆51Updated 7 years ago
- Automated WiFi limit evasion☆117Updated 7 years ago
- Minimalist Selenium WebDriver wrapper to work within rate limits of any amount of websites simultaneously. Parallel processing friendly.☆51Updated 7 years ago
- Seeing how easy it is to create ransomware.☆46Updated last year
- The Hacker's ToolBox☆179Updated 7 years ago
- A ctypes powered python keylogger.☆102Updated 4 years ago
- ☆136Updated this week
- NoobSecToolkit is a Python Based Tool kit that brings together powerful security and anonymity tools and scripts with predefined security…☆111Updated 6 months ago
- Proof-of-concept python IRC botnet for orchestrating macOS computers (harmless due to SIP & Gatekeeper)☆83Updated 3 years ago
- Simple brute forcing in Python.☆101Updated last year
- Encrypted chat application in python☆54Updated 6 years ago
- Various penetration testing tools written in Python. Based mostly on ideas and implementations presented in 'Violent Python: A Cookbook f…☆65Updated 7 years ago
- Hacking as per the book☆34Updated 5 years ago
- A powerful and extensible wireless drop box☆264Updated 5 years ago
- This is an open source tool to dump the wifi profiles and cleartext passwords of the connected access points on the Windows machine. This…☆270Updated 6 years ago
- Mercure is a tool for security managers who want to train their colleague to phishing.☆267Updated 3 years ago
- ☆12Updated this week
- 🕷 A lightning fast multithreaded network scanner framework with modules.☆319Updated 4 years ago
- tools which can be used by forensics experts and ethical hackers☆174Updated 8 years ago
- Pythonic ransomware proof of concept.☆216Updated 4 years ago
- Python OSINT Tool to retrieve information from Skype☆74Updated 8 years ago
- A python module for dumping usable proxies.☆152Updated 4 years ago
- Automatically saves python shell code to a local file or secret Gist☆86Updated 8 years ago
- ☆65Updated this week
- A script written lazily for generating cross-platform backdoors on the go :)☆182Updated 5 years ago
- Python network tool, similar to Netcat with custom features.☆190Updated 7 years ago