Python backdoor that uses http post/get requests to communicate
☆42Aug 24, 2016Updated 9 years ago
Alternatives and similar repositories for ReverseHttp
Users that are interested in ReverseHttp are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploit XXE Out-Of-Band Vulnerability Easily☆16Jul 28, 2016Updated 9 years ago
- Share wifi on windows with arranged password like every hour or every day☆14Feb 4, 2017Updated 9 years ago
- Fast subdomains enumeration tool for penetration testers☆11Jan 31, 2017Updated 9 years ago
- Kill Any Antivirus Using Python For Windows Users .☆46Aug 3, 2016Updated 9 years ago
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login…☆13Sep 27, 2016Updated 9 years ago
- some python3 functions to add spreading features to any python backdoor☆55Jan 22, 2017Updated 9 years ago
- Basic python script for detect airdroid users in lan☆49Sep 30, 2020Updated 5 years ago
- A simple python script to grab twitter account info just by username or profile link☆53Mar 3, 2017Updated 9 years ago
- A python script designed to grab the original url from an adfly url without opening it :D☆57Mar 3, 2017Updated 9 years ago
- Create Basic SSH Honeypot With Python☆29Jul 11, 2016Updated 9 years ago
- Python tool to check the HTTP response code for a list of websites☆23Sep 30, 2021Updated 4 years ago
- A python tool that will extract exif data from picture with two methods☆41Jan 1, 2022Updated 4 years ago
- Python virus that will make your pc paralyzed once it opened :D☆48Jul 20, 2021Updated 4 years ago
- A tool for performing an initial information-gathering scan of websites for penetration tests.☆24Aug 27, 2019Updated 6 years ago
- Some scripts useful for red team activities☆13Jan 18, 2020Updated 6 years ago
- A http flood python script that could stop a normal website in 10s☆403Jun 16, 2021Updated 4 years ago
- IP obfuscator made to make a malicious ip a bit cuter☆551Oct 14, 2024Updated last year
- Uses Google to search for .apks hosted on websites and downloads them☆19Aug 2, 2014Updated 11 years ago
- log file scrubber☆15Jul 27, 2018Updated 7 years ago
- A python script designed to check if the website if vulnerable of clickjacking and create a poc☆157Sep 5, 2020Updated 5 years ago
- Reconnaissance tool of Penetration test & Bug Bounty☆25Aug 1, 2018Updated 7 years ago
- Prompt your users to donate after `npm install`☆14Jan 10, 2021Updated 5 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- Steals chrome and firefox cookies and upload to the server using POST api.☆10May 3, 2016Updated 9 years ago
- ☆24Jul 6, 2018Updated 7 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,454Nov 3, 2018Updated 7 years ago
- Package manager for hackers built by hackers☆36Aug 31, 2018Updated 7 years ago
- ☆10Nov 24, 2020Updated 5 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆19Jun 27, 2019Updated 6 years ago
- Python WiFi is a Python 3 module that provides read and write access to a wireless network card's capabilities using the Linux Wireless E…☆12Aug 26, 2016Updated 9 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆25Jan 31, 2019Updated 7 years ago
- Inject scripted keystrokes and mouse movements into remote desktop sessions, including VMware View, Amazon Workspaces, and Microsoft RDP.…☆16Jul 25, 2014Updated 11 years ago
- A host-based IDS and network monitoring system (My graduation project)☆26Jul 6, 2021Updated 4 years ago
- Basic examples for MITMf☆16Aug 28, 2015Updated 10 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆296Oct 30, 2024Updated last year
- Download files out of open AWS buckets☆38Dec 12, 2018Updated 7 years ago
- Protect your parents from phishing☆40Dec 4, 2017Updated 8 years ago
- Random scripts I write to automate non-hacking stuff☆23Mar 24, 2019Updated 6 years ago
- Metasploit Framework☆16Dec 26, 2025Updated 2 months ago