jade01win / demon
ransomware, made for a demo on ransomware awareness and how easy it is to do
☆14Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for demon
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆117Updated 4 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆140Updated 3 years ago
- This software is for study to Computer Hacker Forensic Investigator certification☆25Updated 4 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆117Updated 4 months ago
- Automated rogue access point setup tool.☆192Updated 3 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆76Updated 3 years ago
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆43Updated last year
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆105Updated last year
- A collection of data exfiltration scripts for Red Team assessments.☆96Updated 4 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆73Updated 4 years ago
- Reconnaissance and Enumeration automation script☆52Updated 3 years ago
- Enumerate a target Based off of Nmap Results☆77Updated last year
- ☆51Updated 3 years ago
- Just a quick and dirty tool I created to automate some of my standard recon/enumeration activities when doing CTFs☆12Updated 3 years ago
- Curated list of awesome, open source data exfiltration tools☆56Updated 3 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆72Updated this week
- Automatic & lightning fast wordpress vulnerability scanner☆44Updated 3 years ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆75Updated 2 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆67Updated 9 months ago
- Functions that can be used to gain Reverse Shells with PowerShell☆82Updated 2 years ago
- Tactics, Techniques, and Procedures☆19Updated 8 months ago
- ☆30Updated 5 years ago
- Offensive Security / Pentesting Cheat Sheets☆96Updated 6 years ago
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.☆76Updated 5 years ago
- Airodump-ng WiFi Scan Visualizer☆56Updated 6 years ago
- Submits multiple domains to VirusTotal API☆60Updated 3 years ago
- blue team, red team stuff. All things cyber ;)☆75Updated 4 months ago