steal victim images exact location device info and much more
-
Updated
May 29, 2024 - HTML
steal victim images exact location device info and much more
Instagram Webview Phishing
Windows/Linux - ReverseShellBackdoor Framework
🏴☠️💰 Another Ransomware gang tracker
A keylogger that sends emails with log attachment - works on all OS
Perform MiTM attack and remove encryption on Windows Remote Registry Protocol.
Dec 28th @ in5 - Introduction to Ethical Hacking and Cyber Security. At this session, we went over the basics of cybersecurity and showed how you can protect yourself from some common attacks. Using Kali Linux as a platform, we isolated exploits and recreate some of the more common major attacks (eg; ‘Man-In-The-Middle’) using a variety of penet…
Attacker can use the scripts to gain reverse shell of a target's machine.
An Open Source Project designed to help Social Workers help victims of Domestic Violence and spread awareness of the issue
CONCEPTION ET RÉALISATION D'UN SYSTÈME DE RECHERCHE BASÉ SUR L'IOT POUR LA LOCALISATION DES VICTIMES D'UNE CATASTROPHE
This is a complete illustrative project on NavMesh in Unity. In this Game the Zombies finds their target(Victim) with the help of the Nav Mesh Technology in Unity and moves towards them until they touch them.
Identifying potential red flags using Watson NLU
Add a description, image, and links to the victim topic page so that developers can more easily learn about it.
To associate your repository with the victim topic, visit your repo's landing page and select "manage topics."