jade01win / demon
ransomware, made for a demo on ransomware awareness and how easy it is to do
☆14Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for demon
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆105Updated last year
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆192Updated 2 years ago
- A WLAN red team framework.☆141Updated last month
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆117Updated 4 months ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆117Updated 4 years ago
- Open-Source Collection of Social Engineering Pretexts☆129Updated 11 months ago
- Automated rogue access point setup tool.☆192Updated 3 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆137Updated 3 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆81Updated 2 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆107Updated 3 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆96Updated 4 years ago
- A Nmap script optimized for Hack the Box and CTFs☆10Updated 3 years ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆285Updated 3 years ago
- Tactics, Techniques, and Procedures☆19Updated 8 months ago
- 📡 🍍Detects activities of PineAP module and starts deauthentication attack (for fake access points - WiFi Pineapple Activities Detection…☆31Updated 2 years ago
- Zero Infrastructure Password Cracking☆393Updated 2 months ago
- Magicleaks it's a python script that checks if an email or a list of email accounts was compromised☆68Updated 2 years ago
- Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pent…☆89Updated 3 years ago
- PAKURI has been merged with Python and launched as a new project, PAKURI-THON.☆144Updated 2 years ago
- Offensive Security / Pentesting Cheat Sheets☆96Updated 6 years ago
- A modular recon tool for pentesting☆228Updated 6 years ago
- ☆51Updated 3 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆72Updated 4 years ago
- Mobile camera-based application that attempts to alter photos to preserve their utility to humans while making them unusable for facial r…☆34Updated last year
- Script for Kali that adds a bunch of tools and customizes it to be much better☆171Updated 3 years ago
- This software is for study to Computer Hacker Forensic Investigator certification☆25Updated 4 years ago
- List of Awesome Offensive Tools written in GO☆196Updated 5 years ago
- PowerShell payload generator☆113Updated 3 years ago
- A tool for enumerating usernames from text, files, or websites☆74Updated 2 years ago