jade01win / demonLinks
ransomware, made for a demo on ransomware awareness and how easy it is to do
☆14Updated 3 years ago
Alternatives and similar repositories for demon
Users that are interested in demon are comparing it to the libraries listed below
Sorting:
- Airodump-ng WiFi Scan Visualizer☆60Updated 7 years ago
- ☆52Updated 4 years ago
- Wordlist generated using leaked databases, Pipal, and CUPP.☆34Updated 7 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 2 years ago
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆43Updated 2 years ago
- "PRinter Exploitation Toolkit" LAN automation tool☆208Updated 5 years ago
- Simple Karma Attack☆69Updated 4 years ago
- Going through http://hacking-printers.net/☆37Updated 8 years ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆107Updated 2 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 4 years ago
- Mirror of the NSA Playset Project☆41Updated 7 years ago
- WebHook for Red Team☆26Updated 4 years ago
- Get clients and access points.☆49Updated 5 years ago
- SimpleEmail is a email recon tool that is fast and easy framework to build on☆44Updated 9 years ago
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆12Updated 4 years ago
- Xfinity / Comcast Wordlist Generator☆63Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 7 months ago
- Kali Linux extra useful packages for CTF and Pentest activities☆11Updated last week
- A Python3 powered bash script written to slightly automate the tool installation process of the Hacker Playbook Book (http://thehackerpla…☆42Updated 5 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆83Updated 4 years ago
- Yet Another Sniffer for monitoring network traffic☆85Updated 4 years ago
- Metasploit Framework☆28Updated 11 years ago
- CLI tools using Harpoon features☆21Updated last year
- Mobile camera-based application that attempts to alter photos to preserve their utility to humans while making them unusable for facial r…☆34Updated 2 years ago
- recon-ng modules for Censys☆37Updated last year
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆122Updated 4 years ago
- A script to configure a TP-Link MR3040 running OpenWRT into a simple, yet powerful penetration-testing "dropbox".☆68Updated 7 months ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆70Updated last year
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆17Updated 4 years ago