NullArray / PyCat
Python network tool, similar to Netcat with custom features.
☆194Updated 7 years ago
Alternatives and similar repositories for PyCat:
Users that are interested in PyCat are comparing it to the libraries listed below
- Create fake AP in Kali with 1 command☆268Updated 9 years ago
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆261Updated 7 years ago
- Mercure is a tool for security managers who want to train their colleague to phishing.☆268Updated 4 years ago
- hacklib - pentesting, port scanning, and logging in anywhere with Python☆92Updated 5 years ago
- The Hacker's ToolBox☆188Updated 7 years ago
- Metasploit AV Evasion Tool☆260Updated 9 years ago
- Blaze Telegram Backdoor Toolkit is a post-exploitation tool that leverages the infrastructure of Telegram as a C&C☆202Updated 6 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆439Updated 7 years ago
- A small python script to check for Cross-Site Tracing (XST)☆134Updated 9 years ago
- [unmaintained] Post-exploitation tool☆185Updated 9 years ago
- A fully featured Windows backdoor that uses Gmail as a C&C server☆500Updated 5 years ago
- Python framework for IT security tools☆268Updated 8 years ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆253Updated 8 years ago
- Poison, reset, spoof, redirect MITM script☆127Updated last year
- Generate Payloads and Control Remote Machines. [Discontinued]☆224Updated 4 years ago
- Veil-Pillage is a post-exploitation framework that integrates with Veil-Evasion.☆159Updated 9 years ago
- Pentest tool for antivirus evasion and running arbitrary payload on target Wintel host☆174Updated 9 years ago
- PenBox - A Penetration Testing Framework - The Tool With All The Tools , The Hacker's Repo☆471Updated 8 years ago
- This is an open source tool to dump the wifi profiles and cleartext passwords of the connected access points on the Windows machine. This…☆282Updated 7 years ago
- A unified console to perform the "kill chain" stages of attacks.☆204Updated last year
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆187Updated 5 years ago
- 🕷 A lightning fast multithreaded network scanner framework with modules.☆324Updated 5 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆286Updated 5 years ago
- Pyxiewps is a wireless attack tool to retrieve the WPS pin in seconds.☆138Updated 5 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆186Updated 6 years ago
- A JBoss script for obtaining remote shell access☆172Updated 4 years ago
- A Simple ARP Spoofer using Scapy☆102Updated 9 years ago
- ☆84Updated 8 years ago
- Specify targets and run sets of tools against them☆389Updated 6 years ago
- Mass exploitation tool in python☆205Updated 6 years ago