jade01win / demonLinks
ransomware, made for a demo on ransomware awareness and how easy it is to do
☆14Updated 3 years ago
Alternatives and similar repositories for demon
Users that are interested in demon are comparing it to the libraries listed below
Sorting:
- The hacker technical cheat sheet☆40Updated 2 weeks ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆108Updated 2 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Updated 3 years ago
- Unpacked tools of CQAcademy☆110Updated 6 years ago
- Mirror of the NSA Playset Project☆41Updated 7 years ago
- Automated rogue access point setup tool.☆197Updated 4 years ago
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆105Updated last year
- Airodump-ng WiFi Scan Visualizer☆60Updated 7 years ago
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆44Updated 3 years ago
- Lightweight Bash Script To Automate Some Useful Information Gathering On IP Address Using Different API's☆26Updated 3 years ago
- Wordlist generated using leaked databases, Pipal, and CUPP.☆34Updated 7 years ago
- Xfinity / Comcast Wordlist Generator☆63Updated 2 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆122Updated 4 years ago
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆237Updated 11 months ago
- RasPwn OS☆60Updated 8 years ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆111Updated 2 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆148Updated 3 years ago
- This python script uses TOR to get a new IP address.. For whatever reason you might need that☆41Updated last month
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆83Updated 4 years ago
- Unique hashes.org "founds" sorted by occurrence. (November 2019)☆79Updated 5 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 4 years ago
- GZip HTTP Bombing in Python for everyone☆43Updated 7 years ago
- Scripts to set up Kali Linux with additional tools, and maintain them.☆63Updated last year
- Hack The Br0w | Play your browser and learn more, hack fun !!☆8Updated 4 years ago
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆43Updated 2 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 2 years ago
- This Script Will Detect Canary Token in Microsoft Word Documents☆54Updated 4 years ago
- WebHook for Red Team☆26Updated 4 years ago
- An nmap NSE script which is able to detect and enumerate (dump payloads and settings) of O.MG cables, connected to defender controlled ne…☆48Updated 5 years ago
- Bind/Reverse Shells, SOCKS, etc over Tor in Golang☆62Updated 4 years ago