NullArray / PyCatLinks
Python network tool, similar to Netcat with custom features.
☆195Updated 8 years ago
Alternatives and similar repositories for PyCat
Users that are interested in PyCat are comparing it to the libraries listed below
Sorting:
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆262Updated 7 years ago
- The Hacker's ToolBox☆188Updated 8 years ago
- hacklib - pentesting, port scanning, and logging in anywhere with Python☆96Updated 6 years ago
- Python framework for IT security tools☆269Updated 8 years ago
- A small python script to check for Cross-Site Tracing (XST)☆135Updated 9 years ago
- Create fake AP in Kali with 1 command☆269Updated 9 years ago
- Mercure is a tool for security managers who want to train their colleague to phishing.☆269Updated 4 years ago
- This is an open source tool to dump the wifi profiles and cleartext passwords of the connected access points on the Windows machine. This…☆290Updated 7 years ago
- [unmaintained] Post-exploitation tool☆183Updated 9 years ago
- Nili is a Tool for Network Scan, Man in the Middle, Protocol Reverse Engineering and Fuzzing.☆216Updated 5 years ago
- A mirror of the original SSLstrip+ code by Leonardo Nve☆182Updated 7 years ago
- Blaze Telegram Backdoor Toolkit is a post-exploitation tool that leverages the infrastructure of Telegram as a C&C☆203Updated 6 years ago
- Mass exploitation tool in python☆206Updated 6 years ago
- Automated digital reconnaissance☆200Updated 2 years ago
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆189Updated 6 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆73Updated 5 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆190Updated 6 years ago
- Poison, reset, spoof, redirect MITM script☆128Updated 2 years ago
- Passive Vulnerability Auditor☆133Updated 9 years ago
- Specify targets and run sets of tools against them☆385Updated 6 years ago
- Advanced Hash Manipulation☆177Updated 5 years ago
- Exploit using barcodes, QRcodes, earn13, datamatrix☆115Updated 9 years ago
- Python clone of arpspoof that can poison hosts via arp-requests as well as arp-replies☆194Updated 6 years ago
- 🕷 A lightning fast multithreaded network scanner framework with modules.☆324Updated 5 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆223Updated 4 years ago
- Raw Packet Injection tool☆238Updated 5 years ago
- CookieCatcher☆143Updated 11 years ago
- SpeedPhishing Framework☆446Updated 6 years ago
- A tool for security professionals to access and interact with remote Microsoft Windows based systems.☆433Updated 7 years ago
- Metasploit AV Evasion Tool☆259Updated 9 years ago