jade01win / demon
ransomware, made for a demo on ransomware awareness and how easy it is to do
☆14Updated 3 years ago
Alternatives and similar repositories for demon
Users that are interested in demon are comparing it to the libraries listed below
Sorting:
- Simple Karma Attack☆69Updated 4 years ago
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆43Updated 2 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆121Updated 4 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆17Updated 4 years ago
- The hacker technical cheat sheet☆38Updated last week
- Repository of tools used in my blog☆51Updated last year
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆40Updated 3 years ago
- Create visualization from Shodan query☆72Updated 3 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆30Updated 4 years ago
- ☆52Updated 4 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆37Updated 2 years ago
- An nmap NSE script which is able to detect and enumerate (dump payloads and settings) of O.MG cables, connected to defender controlled ne…☆48Updated 5 years ago
- "PRinter Exploitation Toolkit" LAN automation tool☆206Updated 5 years ago
- GZip HTTP Bombing in Python for everyone☆43Updated 7 years ago
- A Python3 powered bash script written to slightly automate the tool installation process of the Hacker Playbook Book (http://thehackerpla…☆42Updated 5 years ago
- Wordlist generated using leaked databases, Pipal, and CUPP.☆33Updated 7 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 2 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 4 years ago
- This python script uses TOR to get a new IP address.. For whatever reason you might need that☆41Updated 8 months ago
- Airodump-ng WiFi Scan Visualizer☆59Updated 7 years ago
- PowerShell payload generator☆117Updated 3 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Updated 6 years ago
- Zero-Day Code Injection and Persistence Technique☆33Updated 8 years ago
- ☆14Updated 4 years ago
- WebHook for Red Team☆26Updated 4 years ago
- A script to configure a TP-Link MR3040 running OpenWRT into a simple, yet powerful penetration-testing "dropbox".☆68Updated 6 months ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 4 years ago
- Customized Kali Linux - Ansible playbook☆63Updated 4 years ago
- Collection of our CTF write-ups☆29Updated 4 years ago