VedantGawade / Uzi
A Distinctive Ransomeware.
☆27Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for Uzi
- Library to crawl and extract internal links from domain☆26Updated 6 years ago
- Algorithm Trading web application with Python, Django, PyQt5 and Javascript☆163Updated 9 months ago
- Python code to extract chrome cookie, history and login data files☆58Updated 7 years ago
- Automated WiFi limit evasion☆118Updated 7 years ago
- The Hacker's ToolBox☆182Updated 7 years ago
- Orb is a massive footprinting tool.☆45Updated 4 years ago
- ☆47Updated 5 years ago
- An easy, fast lib to correctly password-protect your data☆253Updated 6 years ago
- Algorithm Visualizer for IPython/Jupyter Notebook☆136Updated 7 years ago
- Advanced Hash Manipulation☆173Updated 5 years ago
- Seeing how easy it is to create ransomware.☆46Updated 2 years ago
- scrapin' proxies with ocr☆19Updated 6 years ago
- A ctypes powered python keylogger.☆104Updated 5 years ago
- ☆13Updated 9 years ago
- A scriptable python slackbot for pythonistas☆71Updated 4 years ago
- A Python Python Google-YouTube History Analytics, which reads your history data you get from Google and provide analytics about your sear…☆51Updated 7 years ago
- Checklist of the most important security countermeasures when designing, testing, and releasing your API☆63Updated 5 years ago
- ❄️ frame of the restful api server created with flask (Not maintenance)☆31Updated 6 years ago
- Mercure is a tool for security managers who want to train their colleague to phishing.☆267Updated 3 years ago
- Fabric tasks to provision infrastructure and deploy Flask web applications☆110Updated 6 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆50Updated 7 years ago
- (This project is abandoned. We recommend you to use flake8-import-order-spoqa instead.)☆52Updated 6 years ago
- Interview questions from multiple tech companies☆63Updated 3 years ago
- ☆13Updated 5 years ago
- Engine for collecting onion domains and crawling from webpage based on Tor network☆10Updated last year
- some python3 functions to add spreading features to any python backdoor☆51Updated 7 years ago
- Example scripts for common python tasks☆57Updated 12 years ago
- A simple PoC crypto ransomware in Python☆16Updated 8 years ago
- Python Security Scripts☆243Updated 2 years ago