jade01win / demonLinks
ransomware, made for a demo on ransomware awareness and how easy it is to do
☆15Updated 3 years ago
Alternatives and similar repositories for demon
Users that are interested in demon are comparing it to the libraries listed below
Sorting:
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆120Updated 5 years ago
- A modular recon tool for pentesting☆261Updated 7 years ago
- Ansible scripts to install tools and files wanted on a new Kali Machine☆33Updated 6 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆150Updated 4 years ago
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆244Updated last year
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆98Updated this week
- Automated rogue access point setup tool.☆200Updated 4 years ago
- A list of private and public (more or less) blackhat boards☆276Updated 6 years ago
- PentBox is a tool that allows us to create honeypot in our system this is written in ruby language.☆135Updated 2 months ago
- A simple wordlists generator and mangler written in Python 3.10.1.☆123Updated last year
- Just a repo of random Python scripts to get pentesters started with the Python language on engagements.☆218Updated 5 years ago
- Zero Infrastructure Password Cracking☆411Updated last year
- Fork from @rsmudge/armitage☆139Updated 3 years ago
- HAT (Hashcat Automation Tool) - An Automated Hashcat Tool for common wordlists and rules to speed up the process of cracking hashes duri…☆304Updated last year
- ☆44Updated 4 years ago
- CrackerJack / Hashcat Web Interface / Context Information Security☆379Updated last year
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆196Updated 3 years ago
- ☆125Updated last year
- This Script Will Detect Canary Token in Microsoft Word Documents☆55Updated 5 years ago
- ☆127Updated 3 years ago
- Script for Kali that adds a bunch of tools and customizes it to be much better☆185Updated 4 years ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆291Updated 4 years ago
- Spoof SSDP replies and create fake UPnP devices to phish for credentials and NetNTLM challenge/response.☆434Updated 2 years ago
- Tryhackme rooms & tools☆65Updated 5 years ago
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆21Updated 5 years ago
- Stack based buffer overflows attacks made simple. BufferSploit is a semi automated CLI based tool for performing stack based buffer overf…☆20Updated 4 years ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆118Updated 2 years ago
- 🔺 Red Team Hardware Toolkit 🔺☆347Updated 5 years ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆32Updated 2 years ago
- An extendable tool to Collect, Crawl and Monitor onion sites on tor network and index collected information on Elasticsearch☆343Updated 3 years ago