Python network tool, similar to Netcat with custom features.
☆197May 31, 2017Updated 8 years ago
Alternatives and similar repositories for PyCat
Users that are interested in PyCat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A fully featured backdoor that uses Gmail as a C&C server☆19Oct 13, 2015Updated 10 years ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Dec 1, 2017Updated 8 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Nov 15, 2019Updated 6 years ago
- A ctypes powered python keylogger.☆107Nov 12, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A Bash script that downloads and unzips scripts that will aid with privilege escalation on a Linux system.☆506Jul 28, 2021Updated 4 years ago
- Automating SQL injection using Burp Proxy Logs and SQLMap☆27Jul 6, 2012Updated 13 years ago
- HTTP Header Analysis Vulnerability Tool☆116Dec 20, 2020Updated 5 years ago
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆15May 17, 2020Updated 5 years ago
- a package of Pentest scripts I have made or commonly use☆632Nov 21, 2025Updated 4 months ago
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆263Oct 31, 2017Updated 8 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆167Aug 23, 2019Updated 6 years ago
- Shodan.io Command Line Interface☆43Jul 10, 2021Updated 4 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Decrypts Cisco VPN Group Passwords☆18Jan 20, 2012Updated 14 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆249Nov 11, 2020Updated 5 years ago
- Various pentest scripts☆14Mar 17, 2014Updated 12 years ago
- This is the list of all rootkits found so far on github and othersites.☆30Dec 7, 2020Updated 5 years ago
- Passive recon / OSINT automation script☆39Nov 3, 2018Updated 7 years ago
- Selenium powered Python script to automate searching for vulnerable web apps.☆348Feb 20, 2022Updated 4 years ago
- Simple network tools written with Scapy.☆23Mar 22, 2016Updated 10 years ago
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 12 years ago
- everything in one place - the best description I could come up with ;)☆27Jun 24, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- [unmaintained] Post-exploitation tool☆181Jan 28, 2016Updated 10 years ago
- Reverser - A Quick Reverse Connection Deployment Script☆12Jun 22, 2012Updated 13 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆60Apr 18, 2017Updated 8 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134May 27, 2019Updated 6 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Pentest tool for antivirus evasion and running arbitrary payload on target Wintel host☆175May 6, 2016Updated 9 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Feb 21, 2016Updated 10 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- DefCon24☆121Sep 2, 2016Updated 9 years ago
- 自己使用的一些脚本,大概和乌云(wooyun)有关☆24Jun 15, 2022Updated 3 years ago
- Projects For the HackRF One☆14Aug 13, 2014Updated 11 years ago
- Unix netcat(nc) in Python☆48Apr 16, 2019Updated 6 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆311Oct 22, 2016Updated 9 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Jan 30, 2017Updated 9 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26May 12, 2016Updated 9 years ago