jade01win / demonLinks
ransomware, made for a demo on ransomware awareness and how easy it is to do
☆14Updated 3 years ago
Alternatives and similar repositories for demon
Users that are interested in demon are comparing it to the libraries listed below
Sorting:
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆245Updated last year
- A modular recon tool for pentesting☆257Updated 7 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆149Updated 4 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆122Updated 5 years ago
- Automated rogue access point setup tool.☆196Updated 4 years ago
- Mirror of the NSA Playset Project☆41Updated 7 years ago
- Xfinity / Comcast Wordlist Generator☆64Updated 2 years ago
- A simple wordlists generator and mangler written in Python 3.10.1.☆122Updated last year
- Zero-Day Code Injection and Persistence Technique☆34Updated 8 years ago
- ☆123Updated last year
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Updated 3 years ago
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆43Updated 2 years ago
- a collection of payloads and scripts from my "Building an Ethical Hacker EDC" YouTube Series☆26Updated 4 years ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆113Updated 2 years ago
- BlueMaho is GUI-shell (interface) for suite of tools for testing security of bluetooth devices. It is freeware, opensource, written on py…☆61Updated 9 years ago
- The Bluetooth penetration testing tool suite☆123Updated 5 years ago
- Major tools used for Digital Forensic Investigation, includes tools used for Image, Audio, Memory, Network and Disk Image data analysis. …☆85Updated 4 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆84Updated 4 years ago
- PentBox is a tool that allows us to create honeypot in our system this is written in ruby language.☆128Updated last year
- Unique hashes.org "founds" sorted by occurrence. (November 2019)☆81Updated 5 years ago
- OneWordlistToListThemAll is a huge mix of password wordlists, proven to be pretty useful to provide some quick hits when cracking several…☆117Updated last month
- Tryhackme rooms & tools☆65Updated 5 years ago
- SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are no…☆44Updated last year
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆108Updated 2 years ago
- Zero Infrastructure Password Cracking☆409Updated last year
- This Script Will Detect Canary Token in Microsoft Word Documents☆55Updated 4 years ago
- Fork from @rsmudge/armitage☆135Updated 2 years ago
- Scripts to set up Kali Linux with additional tools, and maintain them.☆65Updated 2 years ago
- Automatic USB drive malware scanning tool for the security-minded person☆97Updated 9 years ago
- This python script uses TOR to get a new IP address.. For whatever reason you might need that☆42Updated 2 months ago