NullArray / PyCatLinks
Python network tool, similar to Netcat with custom features.
☆196Updated 8 years ago
Alternatives and similar repositories for PyCat
Users that are interested in PyCat are comparing it to the libraries listed below
Sorting:
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆261Updated 8 years ago
- The Hacker's ToolBox☆191Updated 8 years ago
- Create fake AP in Kali with 1 command☆269Updated 10 years ago
- hacklib - pentesting, port scanning, and logging in anywhere with Python☆99Updated 6 years ago
- Python framework for IT security tools☆268Updated 8 years ago
- Blaze Telegram Backdoor Toolkit is a post-exploitation tool that leverages the infrastructure of Telegram as a C&C☆206Updated 7 years ago
- A mirror of the original SSLstrip+ code by Leonardo Nve☆183Updated 7 years ago
- A small python script to check for Cross-Site Tracing (XST)☆132Updated 9 years ago
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆192Updated 6 years ago
- This is an open source tool to dump the wifi profiles and cleartext passwords of the connected access points on the Windows machine. This…☆290Updated 8 years ago
- Automated digital reconnaissance☆203Updated 3 years ago
- Nili is a Tool for Network Scan, Man in the Middle, Protocol Reverse Engineering and Fuzzing.☆217Updated 6 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆70Updated 5 years ago
- Python clone of arpspoof that can poison hosts via arp-requests as well as arp-replies☆198Updated 6 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆225Updated 4 years ago
- [unmaintained] Post-exploitation tool☆182Updated 9 years ago
- Passive Vulnerability Auditor☆135Updated 9 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆438Updated 8 years ago
- A reverse ssh shell written in python, intended for penetration testers to use as a covert channel on windows☆87Updated 10 years ago
- A python based https remote access trojan for penetration testing☆84Updated 9 years ago
- Mercure is a tool for security managers who want to train their colleague to phishing.☆268Updated 4 years ago
- A Simple network sniffer implemented on Python 3☆75Updated 5 years ago
- A unified console to perform the "kill chain" stages of attacks.☆205Updated 2 years ago
- Metasploit AV Evasion Tool☆256Updated 10 years ago
- Exploit using barcodes, QRcodes, earn13, datamatrix☆116Updated 9 years ago
- Advanced Hash Manipulation☆175Updated 6 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆190Updated 7 years ago
- SpeedPhishing Framework☆448Updated 6 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆160Updated 5 years ago
- Jaidam is an open source penetration testing tool that would take as input a list of domain names, scan them, determine if wordpress or j…☆84Updated 7 years ago