r3nt0n / wiperLinks
Secure destruction of sensitive virtual data, temporary files and swap partitions
☆78Updated 2 years ago
Alternatives and similar repositories for wiper
Users that are interested in wiper are comparing it to the libraries listed below
Sorting:
- Simple program to steal private files from removable storages☆87Updated 3 years ago
- Argus Advanced Remote & Local Keylogger For macOS and Windows☆136Updated 2 years ago
- Script to facilitate different functions and checks☆44Updated 3 years ago
- Full Valid Fake Data Generator☆101Updated last year
- Proof of concept denial of service over TOR stress test tool☆42Updated 7 years ago
- A Hacking and Pentesting Tool for Windows☆20Updated 5 months ago
- Windows Hacking FrameWork using Reverse Shell☆105Updated 9 months ago
- A PasteBin scrapper that doesnt rely on the PasteBin scrape API☆73Updated 3 years ago
- This Script Will Detect Canary Token in Microsoft Word Documents☆56Updated 5 years ago
- Information Gathering Simplified.☆74Updated 2 years ago
- A lightweight ducky script generator written in python.☆36Updated 4 years ago
- FCracker is a command line tool designed to brute force encrypted files like zip, 7z, rar, pdf etc.☆36Updated 4 years ago
- WebHook for Red Team☆25Updated 4 years ago
- Python RAT with reverse connection and asymmetric encrypted communications☆15Updated 5 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆92Updated 3 months ago
- Ded Security Framework is a tool aimed at security professionals☆35Updated last year
- Log keystrokes, take screenshots and grab system information from a target host and exfiltrate to Discord and Google Forms.☆20Updated 2 years ago
- A multi threaded Python script designed to brute force directories and files names on webservers.☆79Updated 3 years ago
- A tool designed to analyse email headers☆39Updated 3 years ago
- Sifter - All purpose penetration testing op-center☆81Updated 3 years ago
- Send anonymous text messages with TOR and the TextBelt API☆67Updated 4 years ago
- Arkhota, a web brute forcer for Android.☆19Updated 2 years ago
- Android Crypter/Decrypter App Generator☆50Updated 7 years ago
- Automated rogue access point setup tool.☆199Updated 4 years ago
- Embedding executable files in PDF Documents☆47Updated 6 years ago
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆16Updated 5 years ago
- It is a tool that brings together exploits and news about security and vulnerabilities, with the intention of contributing to the open so…☆66Updated 6 years ago
- Simple Malware Scanner written in python☆91Updated 7 months ago
- extensible exploitation framework shipped on a modular multi-tasking architecture☆76Updated 3 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆47Updated 3 years ago