Viralmaniar / PhirauteeLinks
A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using PowerShell and does not require any third-party libraries. This tool steals the information, holds an organisation’s data to hostage for payments or permanently encrypts/deletes the organisation data.
☆121Updated 4 years ago
Alternatives and similar repositories for Phirautee
Users that are interested in Phirautee are comparing it to the libraries listed below
Sorting:
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 2 years ago
- ☆36Updated 3 years ago
- mosquito - Automating reconnaissance and brute force attacks☆131Updated 5 years ago
- ☆52Updated 4 years ago
- ☆150Updated last year
- Script for Kali that adds a bunch of tools and customizes it to be much better☆182Updated 4 years ago
- Lure - User Recon Automation for GoPhish☆163Updated last year
- SMBMap is a handy SMB enumeration tool☆37Updated 11 months ago
- A polyglot payload generator☆241Updated 2 years ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- Customized Kali Linux - Ansible playbook☆63Updated 4 years ago
- A Linux enumeration script for Hack The Box☆189Updated 5 years ago
- Basic C2 Server☆190Updated 3 years ago
- Open-Source Collection of Social Engineering Pretexts☆135Updated last year
- This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team memb…☆214Updated 6 years ago
- PowerShell payload generator☆117Updated 3 years ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆297Updated 3 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆142Updated 3 years ago
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆212Updated 4 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆254Updated 2 years ago
- ☆53Updated 6 years ago
- PowerShell Empire mod to post-exploit the World!☆136Updated 6 years ago
- Framework for exploiting local vulnerabilities☆84Updated last year
- Exposing phishing kits, creators and malicious actors.☆51Updated 2 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆116Updated 4 years ago
- Enumerate a target Based off of Nmap Results☆78Updated last year
- Fully-featured spear-phishing toolkit - web front-end☆51Updated 4 months ago
- Kal El Network Stress Test and Penetration Testing Toolkit☆56Updated last year
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆146Updated 3 years ago