Python network tool, similar to Netcat with custom features.
☆197May 31, 2017Updated 8 years ago
Alternatives and similar repositories for PyCat
Users that are interested in PyCat are comparing it to the libraries listed below
Sorting:
- A fully featured backdoor that uses Gmail as a C&C server☆19Oct 13, 2015Updated 10 years ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Dec 1, 2017Updated 8 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Nov 15, 2019Updated 6 years ago
- A ctypes powered python keylogger.☆107Nov 12, 2019Updated 6 years ago
- A Bash script that downloads and unzips scripts that will aid with privilege escalation on a Linux system.☆506Jul 28, 2021Updated 4 years ago
- Automating SQL injection using Burp Proxy Logs and SQLMap☆27Jul 6, 2012Updated 13 years ago
- HTTP Header Analysis Vulnerability Tool☆115Dec 20, 2020Updated 5 years ago
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆15May 17, 2020Updated 5 years ago
- a package of Pentest scripts I have made or commonly use☆629Nov 21, 2025Updated 3 months ago
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆263Oct 31, 2017Updated 8 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆167Aug 23, 2019Updated 6 years ago
- Shodan.io Command Line Interface☆43Jul 10, 2021Updated 4 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- Decrypts Cisco VPN Group Passwords☆18Jan 20, 2012Updated 14 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆248Nov 11, 2020Updated 5 years ago
- Various pentest scripts☆14Mar 17, 2014Updated 12 years ago
- This is the list of all rootkits found so far on github and othersites.☆30Dec 7, 2020Updated 5 years ago
- Passive recon / OSINT automation script☆39Nov 3, 2018Updated 7 years ago
- Selenium powered Python script to automate searching for vulnerable web apps.☆350Feb 20, 2022Updated 4 years ago
- Simple network tools written with Scapy.☆23Mar 22, 2016Updated 9 years ago
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 12 years ago
- everything in one place - the best description I could come up with ;)☆27Jun 24, 2020Updated 5 years ago
- [unmaintained] Post-exploitation tool☆181Jan 28, 2016Updated 10 years ago
- Reverser - A Quick Reverse Connection Deployment Script☆12Jun 22, 2012Updated 13 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆60Apr 18, 2017Updated 8 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134May 27, 2019Updated 6 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Pentest tool for antivirus evasion and running arbitrary payload on target Wintel host☆175May 6, 2016Updated 9 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Feb 21, 2016Updated 10 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- DefCon24☆122Sep 2, 2016Updated 9 years ago
- 自己使用的一些脚本,大概和乌云(wooyun)有关☆24Jun 15, 2022Updated 3 years ago
- Unix netcat(nc) in Python☆48Apr 16, 2019Updated 6 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆311Oct 22, 2016Updated 9 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Jan 30, 2017Updated 9 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26May 12, 2016Updated 9 years ago
- Automated Linux evil maid attack☆436Dec 22, 2015Updated 10 years ago