NullArray / PyCatLinks
Python network tool, similar to Netcat with custom features.
☆194Updated 8 years ago
Alternatives and similar repositories for PyCat
Users that are interested in PyCat are comparing it to the libraries listed below
Sorting:
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆261Updated 7 years ago
- hacklib - pentesting, port scanning, and logging in anywhere with Python☆94Updated 5 years ago
- Blaze Telegram Backdoor Toolkit is a post-exploitation tool that leverages the infrastructure of Telegram as a C&C☆202Updated 6 years ago
- The Hacker's ToolBox☆188Updated 8 years ago
- Create fake AP in Kali with 1 command☆269Updated 9 years ago
- A small python script to check for Cross-Site Tracing (XST)☆135Updated 9 years ago
- [unmaintained] Post-exploitation tool☆183Updated 9 years ago
- Python framework for IT security tools☆268Updated 8 years ago
- Nili is a Tool for Network Scan, Man in the Middle, Protocol Reverse Engineering and Fuzzing.☆216Updated 5 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆73Updated 4 years ago
- Automated digital reconnaissance☆199Updated 2 years ago
- ☆194Updated 6 years ago
- Poison, reset, spoof, redirect MITM script☆127Updated 2 years ago
- Metasploit AV Evasion Tool☆259Updated 9 years ago
- A mirror of the original SSLstrip+ code by Leonardo Nve☆181Updated 7 years ago
- Mercure is a tool for security managers who want to train their colleague to phishing.☆268Updated 4 years ago
- Exploit using barcodes, QRcodes, earn13, datamatrix☆114Updated 9 years ago
- This is an open source tool to dump the wifi profiles and cleartext passwords of the connected access points on the Windows machine. This…☆289Updated 7 years ago
- Advanced Hash Manipulation☆177Updated 5 years ago
- Python SQL injection framework☆133Updated 3 years ago
- Automates some pentest jobs via nmap xml file☆323Updated 6 years ago
- ☆84Updated 8 years ago
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆188Updated 6 years ago
- An IRC based tool for testing the capabilities of a botnet.☆141Updated 5 years ago
- A Simple ARP Spoofer using Scapy☆104Updated 10 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆223Updated 4 years ago
- A python based https remote access trojan for penetration testing☆84Updated 9 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆440Updated 8 years ago
- Hidemyass Proxy Grabber☆87Updated 8 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆189Updated 6 years ago