Secure destruction of sensitive virtual data, temporary files and swap partitions
☆77Jan 16, 2023Updated 3 years ago
Alternatives and similar repositories for wiper
Users that are interested in wiper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python RAT with reverse connection and asymmetric encrypted communications☆16Jun 30, 2020Updated 5 years ago
- Machine Learning Model to detect hidden malwares and phase changing malwares.It predicts the date of the next probable attack of the malw…☆13Apr 30, 2020Updated 5 years ago
- Simple but sharp ransomware☆35Jul 11, 2020Updated 5 years ago
- This project is based on detecting phishing/fraud/malicious website using Random Forest Classification formula. Implemented using Python …☆28Oct 2, 2020Updated 5 years ago
- BAT is a tool to help everyone to securing their web-servers.☆10Mar 29, 2021Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A lightweight ducky script generator written in python.☆36Feb 6, 2021Updated 5 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- Chromiux is a python based console app that extracts the encrypted saved passwords/cookies in txt format of chrome browser.☆19May 14, 2021Updated 4 years ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Jun 30, 2020Updated 5 years ago
- This application allows you to remove ALL your tweets.☆13Jun 11, 2018Updated 7 years ago
- Next generation cyber security research and testing software.☆16Mar 18, 2021Updated 5 years ago
- ☆17Mar 7, 2019Updated 7 years ago
- Developed an Anomaly-based intrusion detection system using Multi Level Perceptron☆19Dec 13, 2020Updated 5 years ago
- A collection of Covid-19 related threat intelligence and resources.☆19Jul 17, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Python script that automate the process of generating various reverse shells.☆15Mar 22, 2021Updated 5 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Jul 4, 2020Updated 5 years ago
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆20Mar 12, 2025Updated last year
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- ☆11May 27, 2021Updated 4 years ago
- A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Us…☆376Nov 8, 2022Updated 3 years ago
- ☆15Jul 30, 2022Updated 3 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆31Dec 17, 2018Updated 7 years ago
- A python implementation for secure file transfer. Course project: "Cyber Security" (KFUPM-COE451)☆17Oct 18, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This tool is design to find admin panel of any website by using custom wordlist or default wordlist easily and allow you to find admin pa…☆167Dec 20, 2020Updated 5 years ago
- Malduino compatible USB rubber ducky payloads☆14Jun 7, 2019Updated 6 years ago
- ☆68Dec 9, 2022Updated 3 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- NTP Scanner and 'monlist' checker☆13Sep 1, 2015Updated 10 years ago
- AliGuard PHP WAF☆12Feb 16, 2024Updated 2 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- Python Script to help/automate the WiFi hacking exercises.☆89Mar 11, 2021Updated 5 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆10Mar 25, 2021Updated 5 years ago
- Face Recognition Security☆184Jan 30, 2024Updated 2 years ago
- IcosaSwitch is an All-In-One Switch Hacking applications☆17Sep 19, 2021Updated 4 years ago
- This project aims to create new tweets and carry out social engineering attacks by using the messages that people sent from social media …☆12Dec 16, 2017Updated 8 years ago
- Penetration Test Framwork☆21May 10, 2018Updated 7 years ago
- A Flask Based Web Application which is used to detect the phishing URL's.☆11Nov 27, 2019Updated 6 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆15Jan 20, 2021Updated 5 years ago