D4Vinci / Palsy-Virus
Python virus that will make your pc paralyzed once it opened :D
☆46Updated 3 years ago
Alternatives and similar repositories for Palsy-Virus:
Users that are interested in Palsy-Virus are comparing it to the libraries listed below
- some python3 functions to add spreading features to any python backdoor☆53Updated 8 years ago
- Kill Any Antivirus Using Python For Windows Users .☆44Updated 8 years ago
- Basic python script for detect airdroid users in lan☆48Updated 4 years ago
- Ransomeware☆46Updated 7 years ago
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login…☆13Updated 8 years ago
- Python script that will extract all saved passwords from your google chrome database on windows only☆74Updated 4 years ago
- Python Remote Access Trojan☆136Updated 4 years ago
- Python Remote Access Tool☆24Updated 5 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago
- A python tool that will extract exif data from picture with two methods☆37Updated 3 years ago
- Samsung TV Denial of Service (DoS) Attack☆37Updated 8 years ago
- A remote keylogger with some cool features☆45Updated 7 months ago
- A python3 script that uses cl1p website to send and receive secret messages☆28Updated 4 years ago
- A Metasploit payload that will connect to the victim and open up a permanent backdoor to their phone.☆50Updated 8 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆24Updated 6 years ago
- Loki.Rat is a fork of the Ares RAT, it integrates new modules, like recording , lockscreen , and locate options. Loki.Rat is a Python Rem…☆73Updated 2 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆59Updated 7 years ago
- SQLi Tool/SQL Injection/Hijacker☆42Updated 8 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆51Updated 7 years ago
- SMS Phishing Tools☆78Updated 7 years ago
- Codes for malware, viruses and key-logger and other tools☆31Updated 3 years ago
- Fud Persistent Windows Backdoor developed purely in python☆29Updated 4 years ago
- Dendroid HTTP RAT Original☆68Updated 8 years ago
- Mutation Of Vıruses☆50Updated 9 years ago
- A simple phishing tool that can phish almost any website☆75Updated 6 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆50Updated 8 years ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆61Updated 4 years ago
- This is a keylogger that collects all the data and e-mail it in a set time with system information which includes device S/N and hardware…☆45Updated last year
- A collection of spywares for education scopes☆38Updated 7 years ago
- iSpy Keylogger☆42Updated 8 years ago