Viralmaniar / PhirauteeLinks
A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using PowerShell and does not require any third-party libraries. This tool steals the information, holds an organisation’s data to hostage for payments or permanently encrypts/deletes the organisation data.
☆119Updated 5 years ago
Alternatives and similar repositories for Phirautee
Users that are interested in Phirautee are comparing it to the libraries listed below
Sorting:
- ☆53Updated 4 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- mosquito - Automating reconnaissance and brute force attacks☆131Updated 6 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 3 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated last year
- ☆36Updated 4 years ago
- ☆25Updated 5 years ago
- Airodump-ng WiFi Scan Visualizer☆61Updated 7 years ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Updated 4 years ago
- Bare Bones Banking malware coded for research & educational purposes☆87Updated 5 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆150Updated 4 years ago
- Script for Kali that adds a bunch of tools and customizes it to be much better☆185Updated 4 years ago
- Wi-Fi Exploit Tool☆52Updated 5 years ago
- SMBMap is a handy SMB enumeration tool☆38Updated last year
- A multi threaded Python script designed to brute force directories and files names on webservers.☆79Updated 3 years ago
- Automated rogue access point setup tool.☆200Updated 4 years ago
- Framework for exploiting local vulnerabilities☆84Updated 2 years ago
- A polyglot payload generator☆242Updated 3 years ago
- extensible exploitation framework shipped on a modular multi-tasking architecture☆76Updated 3 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities☆72Updated 4 years ago
- Automate Metasploit scanning and exploitation☆116Updated 5 months ago
- Exposing phishing kits, creators and malicious actors.☆51Updated 3 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆84Updated 4 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆16Updated 6 years ago
- Simple Karma Attack☆68Updated 5 years ago
- Python Script to Crack Zip Password with Dictionary attack and also use Crunch as Pipeline☆38Updated 7 years ago
- It is a tool that brings together exploits and news about security and vulnerabilities, with the intention of contributing to the open so…☆66Updated 6 years ago
- Customized Kali Linux - Ansible playbook☆66Updated 5 years ago