NullArray / PyCat
Python network tool, similar to Netcat with custom features.
☆192Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for PyCat
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆260Updated 7 years ago
- The Hacker's ToolBox☆182Updated 7 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆437Updated 7 years ago
- Python framework for IT security tools☆260Updated 7 years ago
- Create fake AP in Kali with 1 command☆266Updated 8 years ago
- A small python script to check for Cross-Site Tracing (XST)☆136Updated 8 years ago
- Mercure is a tool for security managers who want to train their colleague to phishing.☆267Updated 3 years ago
- hacklib - pentesting, port scanning, and logging in anywhere with Python☆92Updated 5 years ago
- Blaze Telegram Backdoor Toolkit is a post-exploitation tool that leverages the infrastructure of Telegram as a C&C☆193Updated 6 years ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆253Updated 7 years ago
- ☆84Updated 7 years ago
- A framework for Backdoor development!☆436Updated 6 years ago
- Automated digital reconnaissance☆193Updated last year
- WPSploit - Exploiting Wordpress With Metasploit☆215Updated 6 years ago
- Pentest tool for antivirus evasion and running arbitrary payload on target Wintel host☆175Updated 8 years ago
- Exploit using barcodes, QRcodes, earn13, datamatrix☆110Updated 8 years ago
- [unmaintained] Post-exploitation tool☆183Updated 8 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆283Updated 5 years ago
- Poison, reset, spoof, redirect MITM script☆124Updated last year
- Script to generate malicious debian packages (debain trojans).☆117Updated 5 years ago
- Automates some pentest jobs via nmap xml file☆322Updated 6 years ago
- Terminator metasploit payload generator☆177Updated 6 years ago
- A tool for security professionals to access and interact with remote Microsoft Windows based systems.☆429Updated 7 years ago
- A powerful and extensible wireless drop box☆264Updated 5 years ago