jade01win / demonLinks
ransomware, made for a demo on ransomware awareness and how easy it is to do
☆14Updated 3 years ago
Alternatives and similar repositories for demon
Users that are interested in demon are comparing it to the libraries listed below
Sorting:
- Create visualization from Shodan query☆73Updated 4 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- Wordlist generated using leaked databases, Pipal, and CUPP.☆33Updated 7 years ago
- Enumerate a target Based off of Nmap Results☆78Updated last year
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆70Updated last year
- A Nmap script optimized for Hack the Box and CTFs☆12Updated 4 years ago
- SimpleEmail is a email recon tool that is fast and easy framework to build on☆44Updated 9 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆128Updated 4 years ago
- Going through http://hacking-printers.net/☆37Updated 8 years ago
- "PRinter Exploitation Toolkit" LAN automation tool☆208Updated 5 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆121Updated 4 years ago
- recon-ng modules for Censys☆37Updated last year
- SSH Honeypot that gathers creds and attempted commands☆19Updated 4 years ago
- ☆52Updated 4 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆146Updated 3 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated 11 months ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆30Updated 2 years ago
- List of sources for cybersecurity news☆37Updated 2 years ago
- A WLAN red team framework.☆155Updated 8 months ago
- Scripts to set up Kali Linux with additional tools, and maintain them.☆62Updated last year
- Simple Karma Attack☆69Updated 4 years ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆107Updated 2 years ago
- Offensive Security Certified Profesional (OSCP) course scripts, some have been generalized☆51Updated 7 years ago
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆43Updated 2 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆30Updated 4 years ago
- Framework for exploiting local vulnerabilities☆84Updated last year
- The hacker technical cheat sheet☆39Updated last week
- Mirror of the NSA Playset Project☆40Updated 7 years ago
- A Python3 powered bash script written to slightly automate the tool installation process of the Hacker Playbook Book (http://thehackerpla…☆42Updated 5 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Updated 3 years ago