Xanthorox / XenWareLinks
Advanced Ransomware Made with Xanthorox AI
☆33Updated 5 months ago
Alternatives and similar repositories for XenWare
Users that are interested in XenWare are comparing it to the libraries listed below
Sorting:
- an simple python script for converting exe to js , standalone js can be used to convert exe payloade to .js file , Works on All windows …☆18Updated 5 months ago
- Here are +200 different rats some with source code☆117Updated last year
- A comprehensive web application security testing toolkit that combines 10 powerful penetration testing features into one tool.☆38Updated 4 months ago
- IPAnalyzer is an IP Address Tracker OSINT ethical hacking tool built for Linux distributions, designed to gather detailed information abo…☆45Updated 3 weeks ago
- Pentesting Tools to Automatize Active Directory Hacking☆22Updated 3 years ago
- A meticulously curated collection of exploitation tools for the discerning security professional. When precision meets power, and stealt…☆31Updated 5 months ago
- AI Powered Terminal Based Ethical Hacking Assistant☆76Updated 7 months ago
- DarkGPT is an OSINT assistant based on GPT-4-200K (recommended use) designed to perform queries on leaked databases, thus providing an ar…☆113Updated last year
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆69Updated 6 months ago
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆30Updated 2 years ago
- Python3 script to dump breach data from Dehashed☆32Updated 2 months ago
- A Sophisticated, Automated, AI-Driven, State-Sponsored Cyber-Espionage/Counter-Espionage & Zero Click AI-Gen Supply Chain Attack Framewor…☆37Updated 4 months ago
- Browser streaming MITM proxy☆70Updated 2 years ago
- ☆55Updated 2 years ago
- ClatsCracker is a versatile Executable & Python based password-cracking tool supporting 25 hash algorithms. It offers dictionary or brute…☆55Updated 3 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆106Updated last year
- 🔮 Python Remote administration tool via telegram☆53Updated 5 months ago
- Operation Archive - Saving the history behind Cybercriminal Arrests, Documentation, Raids, Seizures, and more!☆57Updated last week
- Hacking the Singularity. Deep learning hacking. Weaponizing AI in Offensive security☆103Updated last year
- Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers☆86Updated 2 weeks ago
- Clipboard poisoning attack.☆59Updated 5 years ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆49Updated 10 months ago
- Social Engineering Browser Update Attack.☆56Updated last year
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆26Updated 2 years ago
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆28Updated 5 months ago
- Boost website hits by generating requests from multiple proxy IPs.☆74Updated last year
- Living Off The Land (LOTL) persistent Reverse shell☆102Updated last year
- IoT Camera Reconnaissance and Live Viewer☆161Updated last year
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.☆61Updated last month