jade01win / demonLinks
ransomware, made for a demo on ransomware awareness and how easy it is to do
☆14Updated 3 years ago
Alternatives and similar repositories for demon
Users that are interested in demon are comparing it to the libraries listed below
Sorting:
- Mirror of the NSA Playset Project☆41Updated 7 years ago
- A simple wordlists generator and mangler written in Python 3.10.1.☆123Updated last year
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆245Updated last year
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆149Updated 4 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆122Updated 5 years ago
- Fork from @rsmudge/armitage☆136Updated 2 years ago
- Automated rogue access point setup tool.☆198Updated 4 years ago
- Unique hashes.org "founds" sorted by occurrence. (November 2019)☆83Updated 5 years ago
- A modular recon tool for pentesting☆259Updated 7 years ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆116Updated 2 years ago
- This is a program that will install Metasploit-Framework and Armitage on to any Debian-based Linux Distro (it can also be adapted to work…☆60Updated 3 years ago
- Secure destruction of sensitive virtual data, temporary files and swap partitions☆80Updated 2 years ago
- Simple script for the WHID injector - a rubberducky wifi☆115Updated last year
- ☆123Updated last year
- GUI based offensive penetration testing tool (Open Source)☆218Updated 2 months ago
- Scripts to set up Kali Linux with additional tools, and maintain them.☆65Updated 2 years ago
- Ansible scripts to install tools and files wanted on a new Kali Machine☆33Updated 5 years ago
- PentBox is a tool that allows us to create honeypot in our system this is written in ruby language.☆131Updated last week
- A list of private and public (more or less) blackhat boards☆275Updated 6 years ago
- Single Page Cheatsheet for common MSF Venom One Liners☆283Updated 6 years ago
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆47Updated 3 years ago
- The Bluetooth penetration testing tool suite☆124Updated 5 years ago
- Project to implement and automate juice jacking: the stealing of phone data through USB connections☆100Updated 8 years ago
- List of commands and techniques to while conducting any kind of hacking :)☆132Updated last year
- Metasploit Cheat Sheet 💣☆454Updated 5 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆196Updated 3 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆84Updated 4 years ago
- BlueMaho is GUI-shell (interface) for suite of tools for testing security of bluetooth devices. It is freeware, opensource, written on py…☆61Updated 9 years ago
- 🔺 Red Team Hardware Toolkit 🔺☆339Updated 5 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆71Updated last year