th3r4ven / R4VENRansomware
Ransonware simples, criptografa arquivos e volta ao normal com a chave fornecida
☆9Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for R4VENRansomware
- Modular framework to exploit UPS devices☆61Updated last year
- A network logging tool that logs per process activities☆32Updated last year
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆14Updated 3 years ago
- VLAN attacks toolkit☆13Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 4 months ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆13Updated 3 months ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆13Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- Automate All Pivoting System Enumeration with this Bash Script☆11Updated 2 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆25Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆32Updated last year
- Internal Network Penetration Test Playbook☆18Updated 3 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆23Updated 3 months ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆24Updated 6 months ago
- MacroExploit use in excel sheet☆20Updated last year
- Python Prototype Scripts to Exploit or Discover Network vulnerabilities and misconfiguration.☆18Updated 7 months ago
- Enumeration & fingerprint tool☆23Updated 8 months ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆12Updated 6 months ago
- ☆17Updated 3 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆31Updated 2 years ago
- Ded Security Framework is a tool aimed at security professionals☆32Updated 6 months ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated last year
- Simple Tool for webhacking☆10Updated last year
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆54Updated 2 years ago
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆19Updated last week
- ☆21Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆23Updated 2 years ago