Xanthorox / XenWareLinks
Advanced Ransomware Made with Xanthorox AI
☆43Updated 10 months ago
Alternatives and similar repositories for XenWare
Users that are interested in XenWare are comparing it to the libraries listed below
Sorting:
- an simple python script for converting exe to js , standalone js can be used to convert exe payloade to .js file , Works on All windows …☆21Updated 10 months ago
- A state-sponsored APT framework for cyber/counter-espionage featuring AI-driven zero-click supply chain attacks, autonomous exploit deplo…☆69Updated this week
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆112Updated 3 weeks ago
- KeyloggerScreenshot is an intelligent tool which logs keys, makes a Screenshot every 20 seconds, recordes the mouse click with x and y po…☆130Updated 3 months ago
- A comprehensive web application security testing toolkit that combines 10 powerful penetration testing features into one tool.☆46Updated 9 months ago
- AI Powered Terminal Based Ethical Hacking Assistant☆87Updated last year
- Here are +200 different rats some with source code☆146Updated 2 years ago
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆30Updated 2 years ago
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability ass…☆43Updated 4 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆66Updated last year
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆131Updated last year
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆28Updated 2 years ago
- ☆69Updated 3 years ago
- Tool to parse Stealer Logs.☆20Updated 2 years ago
- This tool uses the GitHub API to scan repositories owned by a user for email addresses and associated names. It provides options to scan …☆47Updated last month
- Social Engineering Browser Update Attack.☆59Updated 2 years ago
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.☆73Updated 6 months ago
- A tool to download the breach data on BreachForums CND that was uploaded to the threat actor USDoD's CDN.☆63Updated last year
- Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers☆96Updated 5 months ago
- Web Path Finder☆60Updated 2 years ago
- Mass bruteforce authentication of common services with common credentials.☆53Updated 2 years ago
- ☆142Updated last year
- Browser streaming MITM proxy☆75Updated 2 years ago
- Operation Archive - Saving the history behind Cybercriminal Arrests, Documentation, Raids, Seizures, and more!☆64Updated 3 months ago
- Hacking with PasteJacking technique☆22Updated last year
- A windows Wifi Brute forcing utility which is an extremely old method but still works without the requirement of external dependencies.☆79Updated last year
- 🔮 Python Remote administration tool via telegram☆55Updated 9 months ago
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year
- Introducing the Ransomware Builder – an educational tool with a sleek, modern GUI that makes it easy for anyone to create their own ranso…☆18Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆113Updated 2 years ago