VedantGawade / UziLinks
A Distinctive Ransomeware.
☆27Updated 9 years ago
Alternatives and similar repositories for Uzi
Users that are interested in Uzi are comparing it to the libraries listed below
Sorting:
- Algorithm Trading web application with Python, Django, PyQt5 and Javascript☆165Updated last year
- Python network tool, similar to Netcat with custom features.☆195Updated 8 years ago
- Algorithm Visualizer for IPython/Jupyter Notebook☆136Updated 8 years ago
- Python code to extract chrome cookie, history and login data files☆59Updated 7 years ago
- Python Security Scripts☆244Updated 3 years ago
- Remote administration service which uses twitter as a command and control server☆715Updated 4 years ago
- A framework for Backdoor development!☆437Updated 7 years ago
- Automated WiFi limit evasion☆119Updated 8 years ago
- Scratch space for various python lessons I am trying to work through☆117Updated 4 years ago
- This is an open source tool to dump the wifi profiles and cleartext passwords of the connected access points on the Windows machine. This…☆289Updated 7 years ago
- The Hacker's ToolBox☆188Updated 8 years ago
- Library to crawl and extract internal links from domain☆27Updated 7 years ago
- 🕷 A lightning fast multithreaded network scanner framework with modules.☆323Updated 5 years ago
- A powerful and extensible wireless drop box☆267Updated 6 years ago
- A Data Visualization of Box Office History.☆18Updated 10 years ago
- A report card for Python application☆97Updated 4 years ago
- Mercure is a tool for security managers who want to train their colleague to phishing.☆268Updated 4 years ago
- Phishing on Twitter☆255Updated 7 years ago
- Advanced Hash Manipulation☆177Updated 5 years ago
- An easy, fast lib to correctly password-protect your data☆255Updated 6 years ago
- ☆13Updated 10 years ago
- ❄️ frame of the restful api server created with flask (Not maintenance)☆31Updated 7 years ago
- Example scripts for common python tasks☆57Updated 13 years ago
- HackBox is a powerful and comprehensive tool that combines a variety of techniques for web application and network security assessments, …☆404Updated 2 years ago
- "Hacking Secret Ciphers with Python" programs☆356Updated 4 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆222Updated 4 years ago
- NXcrypt - 'python backdoor' framework☆367Updated 8 years ago
- Pythonic ransomware proof of concept.☆217Updated 5 years ago
- Simple brute forcing in Python.☆105Updated last year
- Python reverse shell.☆297Updated last year