obscuritylabs / darksideLinks
Darkside Ransomware
☆12Updated 4 years ago
Alternatives and similar repositories for darkside
Users that are interested in darkside are comparing it to the libraries listed below
Sorting:
- Script to create Onion Mirror for Clearnet site based on Enterprise Onion Toolkit☆15Updated 3 years ago
- the assembly shell and backdoor Trojan☆18Updated 3 years ago
- Host IDS for desktop users☆12Updated 4 years ago
- ShellC0de Generator☆11Updated 4 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆25Updated 4 years ago
- Modern Javascript keylogger with web panel☆22Updated 5 years ago
- A collection of personal ZAP scripts☆14Updated 2 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 5 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆11Updated 5 years ago
- recover Firefox and more browsers logins☆50Updated 3 years ago
- Finder Predator The Thief botnet panel☆7Updated 5 years ago
- Python Keylogger PortScanner BruteForce and basic hack tools.(new ones will come soon)☆16Updated 4 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆29Updated 3 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Updated 4 years ago
- Some ELF Malwares☆9Updated 3 years ago
- Persistent & Undetectable Malware Backdoor☆27Updated last year
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 4 years ago
- A Hacking and Pentesting Tool for Windows☆20Updated 4 months ago
- A localhost implementation of a botnet used to perform a credential stuffing attack☆13Updated 4 years ago
- A curated list of Ransomware IoCs and Decryptors☆10Updated 3 years ago
- Information Stealers Wall of Sheep (IS-WOS)☆12Updated 4 years ago
- Author : Mr.TenAr☆11Updated 4 years ago
- Inject Metasploit Shell Code in Legitimate Process☆11Updated 4 years ago
- Ransomware for demonstration☆17Updated 2 years ago
- KeplerPulse is a tool that generates a Powershell command that once executed on a Machine, Downloads and executes your desired Executable…☆10Updated 3 years ago
- Educational ransomware for evaluating ransomware detection tools☆8Updated 2 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 6 years ago