All Projects → Jasmin-Ransomware → Similar Projects or Alternatives

1268 Open source projects that are alternatives of or similar to Jasmin-Ransomware

Webspoilt
This script will you help to find the information about the website and to help in penetrating testing
Stars: ✭ 34 (-59.52%)
AttackSurfaceManagement
Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (-46.43%)
conti-pentester-guide-leak
Leaked pentesting manuals given to Conti ransomware crooks
Stars: ✭ 772 (+819.05%)
007-TheBond
This Script will help you to gather information about your victim or friend.
Stars: ✭ 371 (+341.67%)
Ethical Hacking Tools
Complete Listing and Usage of Tools used for Ethical Hacking
Stars: ✭ 272 (+223.81%)
Pentest-Bookmarkz
A collection of useful links for Pentesters
Stars: ✭ 118 (+40.48%)
Sn1per
Attack Surface Management Platform | Sn1perSecurity LLC
Stars: ✭ 4,897 (+5729.76%)
anubis
Captive wifi hotspot bypass tool for Linux
Stars: ✭ 46 (-45.24%)
Mutual labels:  kali-linux, hacking-tool, parrotsec
py-scripts-other
A collection of some of my scripts
Stars: ✭ 79 (-5.95%)
Pentesting Bible
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+10591.67%)
Mutual labels:  bugbounty, kali-linux, hacking-tool
phisherprice
All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.
Stars: ✭ 38 (-54.76%)
Lucifer
A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
Stars: ✭ 302 (+259.52%)
Xeexe Topantivirusevasion
Undetectable & Xor encrypting with custom KEY (FUD Metasploit Rat) bypass Top Antivirus like BitDefender,Malwarebytes,Avast,ESET-NOD32,AVG,... & Automatically Add ICON and MANIFEST to excitable
Stars: ✭ 387 (+360.71%)
Mutual labels:  ransomware, hacking-tool, metasploit
One Lin3r
Gives you one-liners that aids in penetration testing operations, privilege escalation and more
Stars: ✭ 1,259 (+1398.81%)
Mutual labels:  kali-linux, hacking-tool, metasploit
Proton
Proton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (+69.05%)
Mutual labels:  kali-linux, hacking-tool, metasploit
SuperLibrary
Information Security Library
Stars: ✭ 60 (-28.57%)
Mutual labels:  cybersecurity, bugbounty, kali-linux
SQLi-Query-Tampering
SQLi Query Tampering extends and adds custom Payload Generator/Processor in Burp Suite's Intruder. This extension gives you the flexibility of manual testing with many powerful evasion techniques.
Stars: ✭ 123 (+46.43%)
Mutual labels:  bugbounty, burpsuite, pentesting-tools
Andspoilt
Run interactive android exploits in linux.
Stars: ✭ 101 (+20.24%)
Mutual labels:  kali-linux, hacking-tool, metasploit
Minesweeper
A Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 23000 malicious cryptocurrency mining domains (cryptojacking).
Stars: ✭ 162 (+92.86%)
Mutual labels:  bugbounty, hacking-tool, burpsuite
Tool X
Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install almost 370+ hacking tools in termux app and other linux based distributions.
Stars: ✭ 3,361 (+3901.19%)
Mutual labels:  kali-linux, hacking-tool, termux-tools
JAR
Just Another Repo
Stars: ✭ 53 (-36.9%)
Mutual labels:  kali-linux, hacking-tool, termux-tools
VirusX5
The Most Powerful Fake Page Redirecting tool...
Stars: ✭ 15 (-82.14%)
Mutual labels:  kali-linux, hacking-tool, metasploit
Entropy
Entropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
Stars: ✭ 126 (+50%)
Mutual labels:  kali-linux, hacking-tool, metasploit
Mouse
Mouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: ✭ 186 (+121.43%)
Mutual labels:  kali-linux, hacking-tool, metasploit
argus
Argus Advanced Remote & Local Keylogger For macOS and Windows
Stars: ✭ 87 (+3.57%)
Brutegram
Instagram multi-bruteforce Platfrom
Stars: ✭ 183 (+117.86%)
Mutual labels:  kali-linux, hacking-tool, termux-tools
ReversePowerShell
Functions that can be used to gain Reverse Shells with PowerShell
Stars: ✭ 48 (-42.86%)
Mutual labels:  cybersecurity, redteaming
Subzy
Subdomain takeover vulnerability checker
Stars: ✭ 287 (+241.67%)
Mutual labels:  cybersecurity, bugbounty
Xxe Injection Payload List
🎯 XML External Entity (XXE) Injection Payload List
Stars: ✭ 304 (+261.9%)
Mutual labels:  cybersecurity, bugbounty
wifi-deauther
A fully automatic wifi deauther coded in Python
Stars: ✭ 25 (-70.24%)
Mutual labels:  cybersecurity, kali-linux
A Red Teamer Diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (+354.76%)
Mutual labels:  cybersecurity, metasploit
lit-bb-hack-tools
Little Bug Bounty & Hacking Tools⚔️
Stars: ✭ 180 (+114.29%)
Mutual labels:  bugbounty, hacking-tool
Keylogger
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Stars: ✭ 604 (+619.05%)
Mutual labels:  cybersecurity, hacking-tool
Bigbountyrecon
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Stars: ✭ 541 (+544.05%)
Mutual labels:  cybersecurity, bugbounty
Lockdoor Framework
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (+705.95%)
Mutual labels:  cybersecurity, hacking-tool
Zile
Extract API keys from file or url using by magic of python and regex.
Stars: ✭ 61 (-27.38%)
Mutual labels:  cybersecurity, bugbounty
awesome-list-of-secrets-in-environment-variables
🦄🔒 Awesome list of secrets in environment variables 🖥️
Stars: ✭ 538 (+540.48%)
Mutual labels:  cybersecurity, bugbounty
Search That Hash
🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡
Stars: ✭ 466 (+454.76%)
Mutual labels:  cybersecurity, hacking-tool
Slowloris
Asynchronous Python implementation of SlowLoris DoS attack
Stars: ✭ 51 (-39.29%)
Mutual labels:  cybersecurity, hacking-tool
Wifipassword Stealer
Get All Registered Wifi Passwords from Target Computer.
Stars: ✭ 97 (+15.48%)
Mutual labels:  cybersecurity, hacking-tool
Bbrecon
Python library and CLI for the Bug Bounty Recon API
Stars: ✭ 169 (+101.19%)
Mutual labels:  cybersecurity, bugbounty
Pyiris Backdoor
PyIris-backdoor is a modular, stealthy and flexible remote-access-toolkit written completely in python used to command and control other systems. It is now in the beta stage, possibly perpetually. There are bugs still present in the framework, feel free to contribute or help me out with this project its still under active development >_>
Stars: ✭ 145 (+72.62%)
Mutual labels:  cybersecurity, kali-linux
Hack Tools
The all-in-one Red Team extension for Web Pentester 🛠
Stars: ✭ 2,750 (+3173.81%)
Mutual labels:  cybersecurity, metasploit
Osweep
Don't Just Search OSINT. Sweep It.
Stars: ✭ 225 (+167.86%)
Mutual labels:  cybersecurity, ransomware
The Big List Of Hacked Malware Web Sites
This repository contains a list of all web sites I come across that are either hacked with or purposefully hosting malware, ransomware, viruses or trojans.
Stars: ✭ 125 (+48.81%)
Mutual labels:  cybersecurity, ransomware
Lockphish
Lockphish it's the first tool (07/04/2020) for phishing attacks on the lock screen, designed to grab Windows credentials, Android PIN and iPhone Passcode using a https link.
Stars: ✭ 186 (+121.43%)
Mutual labels:  cybersecurity, kali-linux
IP-Tracker
Track any ip address with IP-Tracker. IP-Tracker is developed for Linux and Termux. you can retrieve any ip address information using IP-Tracker.
Stars: ✭ 53 (-36.9%)
Mutual labels:  kali-linux, hacking-tool
reosploit
A Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Stars: ✭ 89 (+5.95%)
Mutual labels:  cybersecurity, hacking-tool
Sherlock
This script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
Stars: ✭ 36 (-57.14%)
Mutual labels:  cybersecurity, redteaming
Defaultcreds Cheat Sheet
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (+2220.24%)
Mutual labels:  cybersecurity, bugbounty
Terminhack
👨‍💻 Impress your friends by pretending to be a real hacker
Stars: ✭ 73 (-13.1%)
Mutual labels:  kali-linux, metasploit
trolo
trolo - an easy to use script for generating Payloads that bypasses antivirus
Stars: ✭ 45 (-46.43%)
Mutual labels:  hacking-tool, metasploit
vaf
Vaf is a cross-platform very advanced and fast web fuzzer written in nim
Stars: ✭ 294 (+250%)
Mutual labels:  bugbounty, burpsuite
Owlyshield
Owlyshield is an EDR framework designed to safeguard vulnerable applications from potential exploitation (C&C, exfiltration and impact))..
Stars: ✭ 281 (+234.52%)
Mutual labels:  cybersecurity, ransomware
awesome-ddos-tools
Collection of several DDos tools.
Stars: ✭ 75 (-10.71%)
Mutual labels:  cybersecurity, hacking-tool
Black-Tool
Install the tools and start Attacking , black-tool v5.0 ! ⬛
Stars: ✭ 239 (+184.52%)
Mutual labels:  kali-linux, hacking-tool
Sudomy
Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
Stars: ✭ 1,572 (+1771.43%)
Mutual labels:  bugbounty, kali-linux
PyIris
PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: ✭ 296 (+252.38%)
Mutual labels:  cybersecurity, kali-linux
OSINTBookmarks
OSINT Bookmarks for Firefox / Chrome / Edge / Safari
Stars: ✭ 34 (-59.52%)
Mutual labels:  cybersecurity, redteaming
termux-wifi
Bash script which installs and runs the Fluxion tool inside Termux, a wireless security auditing tool used to perform attacks such as WPA/WPA2 cracking and MITM attacks.
Stars: ✭ 406 (+383.33%)
1-60 of 1268 similar projects