obscuritylabs / darksideLinks
Darkside Ransomware
☆12Updated 4 years ago
Alternatives and similar repositories for darkside
Users that are interested in darkside are comparing it to the libraries listed below
Sorting:
- KeplerPulse is a tool that generates a Powershell command that once executed on a Machine, Downloads and executes your desired Executable…☆10Updated 3 years ago
- Persistent & Undetectable Malware Backdoor☆27Updated last year
- Simple keylogger on C++ with several functions.☆17Updated 4 years ago
- the assembly shell and backdoor Trojan☆19Updated 3 years ago
- Script to create Onion Mirror for Clearnet site based on Enterprise Onion Toolkit☆14Updated 3 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 6 years ago
- Information Stealers Wall of Sheep (IS-WOS)☆12Updated 4 years ago
- DarkComet☆13Updated 2 years ago
- GhostSec Scam Detection Tool☆15Updated 4 years ago
- A SMTP Checker / SMTP Cracker with SOCKS support and e-mail delivery test (inbox check) for mailpass combolists.☆14Updated 3 years ago
- Public exploits☆14Updated 7 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 5 years ago
- recover Firefox and more browsers logins☆50Updated 3 years ago
- Modern Javascript keylogger with web panel☆22Updated 5 years ago
- This repository contains tips, tricks, and examples of aggressor script functions. The intent is to share bite size examples that can be …☆12Updated 3 years ago
- Command line Remote Access tool (RAT) targeting Windows Systems.☆14Updated 5 years ago
- Host IDS for desktop users☆11Updated 4 years ago
- Download payload to disk and install it to startup then melt.☆36Updated 6 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆13Updated 8 years ago
- Repository of tools used in my blog☆51Updated last year
- Windows Auto Post Exploitation - For ReD Team☆15Updated 5 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- Automated encryption utilities and installation☆12Updated 4 years ago
- A localhost implementation of a botnet used to perform a credential stuffing attack☆13Updated 4 years ago
- HashExpoit is Great Tool For Cracking Hash☆25Updated 4 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆16Updated 7 years ago
- It is a script written in Python that performs brute force on workers' payroll files through the use of their DNI (National Identity Docu…☆12Updated 4 years ago
- A simple, yet highly customizable, script to use with cloned websites for phishing and credentials harvesting☆18Updated 3 years ago