jade01win / demon
ransomware, made for a demo on ransomware awareness and how easy it is to do
☆14Updated 2 years ago
Alternatives and similar repositories for demon:
Users that are interested in demon are comparing it to the libraries listed below
- The hacker technical cheat sheet☆35Updated 4 months ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆106Updated last year
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆68Updated last year
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆73Updated 2 months ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆119Updated 4 years ago
- Squatm3 is a python tool designed to enumerate available domains generated modifying the original domain name through different technique…☆41Updated 5 years ago
- recon-ng modules for Censys☆36Updated last year
- This software is for study to Computer Hacker Forensic Investigator certification☆25Updated 5 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 4 years ago
- Airodump-ng WiFi Scan Visualizer☆56Updated 6 years ago
- Just a quick and dirty tool I created to automate some of my standard recon/enumeration activities when doing CTFs☆11Updated 3 years ago
- SimpleEmail is a email recon tool that is fast and easy framework to build on☆43Updated 9 years ago
- Xfinity / Comcast Wordlist Generator☆58Updated last year
- Simple Karma Attack☆66Updated 4 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆143Updated 3 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆36Updated 2 years ago
- A script to configure a TP-Link MR3040 running OpenWRT into a simple, yet powerful penetration-testing "dropbox".☆68Updated 2 months ago
- Use the Hacker Target IP Tools API for Reconnaissance in Maltego☆55Updated 4 years ago
- Scripts to set up Kali Linux with additional tools, and maintain them.☆58Updated last year
- PortForce - A custom port Brute Forcing Tool for CTF's & Pentests☆28Updated 7 years ago
- A database for storing, querying and doing stats on credential leaks☆39Updated last year
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆65Updated 3 years ago
- CHEAT SHEET DE SEGURIDAD PARA ETHICAL HACKING & PENETRATION TESTING☆22Updated 8 years ago
- WebHook for Red Team☆24Updated 3 years ago
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆43Updated last year
- Leakedsource like "Data Breach Search Engine" with cool Material UI☆20Updated 6 years ago
- Repository of tools used in my blog☆50Updated 10 months ago
- Reverse shell auto generator used for Hackthebox/OSCP/Pentest/LABExp☆41Updated 4 years ago
- Create visualization from Shodan query☆72Updated 3 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago