jade01win / demonLinks
ransomware, made for a demo on ransomware awareness and how easy it is to do
☆16Updated 3 years ago
Alternatives and similar repositories for demon
Users that are interested in demon are comparing it to the libraries listed below
Sorting:
- PentBox is a tool that allows us to create honeypot in our system this is written in ruby language.☆141Updated 4 months ago
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆46Updated 2 years ago
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆244Updated last year
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆119Updated 5 years ago
- A modular recon tool for pentesting☆261Updated 7 years ago
- Mirror of the NSA Playset Project☆45Updated 8 years ago
- ☆125Updated last year
- Automated rogue access point setup tool.☆201Updated 4 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆148Updated 4 years ago
- A simple wordlists generator and mangler written in Python 3.10.1.☆124Updated 2 years ago
- Simple script for the WHID injector - a rubberducky wifi☆116Updated last year
- Fork from @rsmudge/armitage☆140Updated 3 years ago
- Zero Infrastructure Password Cracking☆413Updated last year
- Malicious PDF files recently considered one of the most dangerous threats to the system security. The flexible code-bearing vector of the…☆230Updated 3 years ago
- Scripts to set up Kali Linux with additional tools, and maintain them.☆67Updated 2 months ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆87Updated 5 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆196Updated 4 years ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆121Updated 2 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆99Updated this week
- Project to implement and automate juice jacking: the stealing of phone data through USB connections☆103Updated 8 years ago
- The Bluetooth penetration testing tool suite☆129Updated 5 years ago
- A list of private and public (more or less) blackhat boards☆275Updated 6 years ago
- A collection of tools created for computer security research purposes.☆135Updated last week
- Simple DNS Spoofing tool made in Python 3 with Scapy☆79Updated 6 years ago
- Single Page Cheatsheet for common MSF Venom One Liners☆307Updated 6 years ago
- Script for Kali that adds a bunch of tools and customizes it to be much better☆185Updated 5 years ago
- Xfinity / Comcast Wordlist Generator☆77Updated 2 years ago
- Automatic USB drive malware scanning tool for the security-minded person☆96Updated 9 years ago
- GUI based offensive penetration testing tool (Open Source)☆220Updated 6 months ago
- This Script Will Detect Canary Token in Microsoft Word Documents☆56Updated 5 years ago