Viralmaniar / Phirautee
A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using PowerShell and does not require any third-party libraries. This tool steals the information, holds an organisation’s data to hostage for payments or permanently encrypts/deletes the organisation data.
☆120Updated 4 years ago
Alternatives and similar repositories for Phirautee:
Users that are interested in Phirautee are comparing it to the libraries listed below
- An advanced graphical search engine for Exploit-DB☆117Updated 8 months ago
- Enumerate a target Based off of Nmap Results☆77Updated last year
- Functions that can be used to gain Reverse Shells with PowerShell☆82Updated 2 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 4 years ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Updated 4 years ago
- Basic C2 Server☆186Updated 3 years ago
- ☆51Updated 3 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated 7 months ago
- A Linux enumeration script for Hack The Box☆187Updated 5 years ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆290Updated 3 years ago
- A simple script to generate a hidden url for social engineering.☆123Updated 4 years ago
- Phishlets for Evilginx2 (MITM proxy Framework)☆148Updated 4 years ago
- Simple & Customizable DNS Data Exfiltrator☆107Updated last year
- AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities☆71Updated 3 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆96Updated 3 years ago
- Bare Bones Banking malware coded for research & educational purposes☆87Updated 4 years ago
- A polyglot payload generator☆239Updated 2 years ago
- "PRinter Exploitation Toolkit" LAN automation tool☆203Updated 5 years ago
- mosquito - Automating reconnaissance and brute force attacks☆129Updated 5 years ago
- extensible exploitation framework shipped on a modular multi-tasking architecture☆76Updated 2 years ago
- Lure - User Recon Automation for GoPhish☆161Updated last year
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆144Updated 3 years ago
- PowerShell Empire mod to post-exploit the World!☆136Updated 6 years ago
- ☆149Updated last year
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆249Updated last year
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆116Updated 4 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆127Updated 3 years ago
- PAKURI has been merged with Python and launched as a new project, PAKURI-THON.☆144Updated 3 years ago
- Python based c2 server with a basic beacon server to route the traffic from dummy server to prevent attacker's ip from getting exposed☆25Updated 5 years ago
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆14Updated 6 years ago