JunHao95 / malware_python
Malware programs written in python, reference from PatrikH0lop/malware_showcase
☆43Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for malware_python
- Simple Python SSH Brute Forcing (Credential Stuffing)☆204Updated last year
- ☆286Updated 2 years ago
- OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once install…☆145Updated last month
- ☆128Updated last year
- A fully automatic wifi deauther coded in Python☆125Updated last year
- ☆186Updated 3 years ago
- A small and efficent script to send SMS all over the world anonymously☆464Updated last year
- Powershell scripts used in David Bombal's YouTube videos.☆120Updated 4 years ago
- hak5 YouTube videos☆467Updated 2 years ago
- OSINT tool that allows you to find a person's accounts and emails + breached emails 🕵️☆118Updated 3 years ago
- DucKey Logger [Duck Key Logger] is a PowerShell based keylogger for the USB Rubber Ducky. I believe it is currently the most advanced one…☆81Updated last year
- PentBox is a tool that allows us to create honeypot in our system this is written in ruby language.☆115Updated last year
- ☆12Updated 3 years ago
- Rogue access point tool.☆59Updated 2 years ago
- "Essential Kali Linux commands for ethical hackers and penetration testers."☆55Updated last year
- Denial of Service tool by ParzivalHack☆29Updated last year
- ☆269Updated 2 years ago
- Open source toolkit for scraping, OSINT and more.☆360Updated 4 months ago
- ☆48Updated last year
- Flash the usb rubber ducky program with python!☆50Updated last year
- An automation script written in Python to convert a Raspberry Pi into a WiFi hacking device☆59Updated 2 years ago
- Profil3r is an OSINT tool that allows you to find potential profiles of a person on social networks, as well as their email addresses. Th…☆108Updated 7 months ago
- Repository for security-related Python scripts.☆193Updated last year
- ☆18Updated last month
- Obtain a Phone Number full profile including HLR, Reputation, Carrier, Social Media Accounts, Geolocation, Validation, Availabilty, Porta…☆187Updated 11 months ago
- ☆183Updated 2 years ago
- Gathers network information, then simultaniously logs keys, takes screenshots, takes webcam pictures, and records mic.☆26Updated last year
- A framework like a metasploit containg a variety of modules for pentesting or ethical hacking. This repo willl be updated and new modules…☆110Updated 2 weeks ago