obscuritylabs / darkside
Darkside Ransomware
☆12Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for darkside
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆12Updated 4 years ago
- Host IDS for desktop users☆11Updated 3 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆12Updated 4 years ago
- Shadow Strike is a hacking framework that aids in information gathering, payload generation, payload delivery, and website exploitation.☆8Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- A localhost implementation of a botnet used to perform a credential stuffing attack☆13Updated 3 years ago
- Blinder is a tool that will help you simplify the exploitation of blind SQL injection☆9Updated 3 years ago
- Information Stealers Wall of Sheep (IS-WOS)☆13Updated 4 years ago
- 4/5 of the leaks provided by TheShadowBrokers containing content from The Equation Group.☆10Updated 7 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 2 years ago
- DarkComet☆13Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆16Updated 3 years ago
- Automated encryption utilities and installation☆12Updated 4 years ago
- Open YARA scan- and search engine☆17Updated last week
- Ransomware for demonstration☆15Updated last year
- Modern Javascript keylogger with web panel☆22Updated 4 years ago
- Face-recognition using python 2+ opencv☆7Updated 6 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 2 years ago
- A collection of personal ZAP scripts☆13Updated last year
- 🔅 Reverse shell written on python3☆15Updated 3 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆11Updated 2 years ago
- Persistent & Undetectable Malware Backdoor☆28Updated 6 months ago
- A simple, yet highly customizable, script to use with cloned websites for phishing and credentials harvesting