Viralmaniar / PhirauteeLinks
A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using PowerShell and does not require any third-party libraries. This tool steals the information, holds an organisation’s data to hostage for payments or permanently encrypts/deletes the organisation data.
☆122Updated 4 years ago
Alternatives and similar repositories for Phirautee
Users that are interested in Phirautee are comparing it to the libraries listed below
Sorting:
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 2 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- ☆52Updated 4 years ago
- ☆36Updated 3 years ago
- Open-Source Collection of Social Engineering Pretexts☆135Updated last year
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Updated 4 years ago
- ☆53Updated 6 years ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆296Updated 3 years ago
- Basic C2 Server☆191Updated 3 years ago
- Customized Kali Linux - Ansible playbook☆63Updated 4 years ago
- mosquito - Automating reconnaissance and brute force attacks☆131Updated 5 years ago
- Script for Kali that adds a bunch of tools and customizes it to be much better☆183Updated 4 years ago
- PowerShell payload generator☆117Updated 3 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆147Updated 3 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated 11 months ago
- ☆150Updated last year
- Automate Metasploit scanning and exploitation☆115Updated 8 months ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆30Updated 4 years ago
- A polyglot payload generator☆242Updated 2 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆254Updated 2 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 3 years ago
- A Linux enumeration script for Hack The Box☆189Updated 5 years ago
- "PRinter Exploitation Toolkit" LAN automation tool☆208Updated 5 years ago
- AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities☆73Updated 3 years ago
- Exposing phishing kits, creators and malicious actors.☆51Updated 2 years ago
- One line PS scripts that may come handy during your network assesment☆78Updated 5 years ago
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆41Updated 4 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆74Updated 4 years ago
- Phishlets for Evilginx2 (MITM proxy Framework)☆156Updated 4 years ago