steal victim images exact location device info and much more
-
Updated
May 29, 2024 - HTML
steal victim images exact location device info and much more
🏴☠️💰 Another Ransomware gang tracker
Instagram Webview Phishing
Windows/Linux - ReverseShellBackdoor Framework
Dec 28th @ in5 - Introduction to Ethical Hacking and Cyber Security. At this session, we went over the basics of cybersecurity and showed how you can protect yourself from some common attacks. Using Kali Linux as a platform, we isolated exploits and recreate some of the more common major attacks (eg; ‘Man-In-The-Middle’) using a variety of penet…
Perform MiTM attack and remove encryption on Windows Remote Registry Protocol.
Attacker can use the scripts to gain reverse shell of a target's machine.
A keylogger that sends emails with log attachment - works on all OS
Identifying potential red flags using Watson NLU
An Open Source Project designed to help Social Workers help victims of Domestic Violence and spread awareness of the issue
This is a complete illustrative project on NavMesh in Unity. In this Game the Zombies finds their target(Victim) with the help of the Nav Mesh Technology in Unity and moves towards them until they touch them.
CONCEPTION ET RÉALISATION D'UN SYSTÈME DE RECHERCHE BASÉ SUR L'IOT POUR LA LOCALISATION DES VICTIMES D'UNE CATASTROPHE
Add a description, image, and links to the victim topic page so that developers can more easily learn about it.
To associate your repository with the victim topic, visit your repo's landing page and select "manage topics."