Obfuscator for Python
☆374Feb 23, 2024Updated 2 years ago
Alternatives and similar repositories for Opy
Users that are interested in Opy are comparing it to the libraries listed below
Sorting:
- Pyminifier is a Python code minifier, obfuscator, and compressor.☆1,550Jul 13, 2023Updated 2 years ago
- Obfuscate a python code 2.x and 3.x☆642Jul 25, 2020Updated 5 years ago
- pyobfuscate☆657Sep 17, 2023Updated 2 years ago
- A simple trojan in python, disguised as an animated ASCII bunny (for pedagogical purposes)☆47Sep 29, 2021Updated 4 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26May 12, 2016Updated 9 years ago
- PEAnalyser is an open source PE file analysis tool.☆11Oct 26, 2020Updated 5 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆25Dec 19, 2020Updated 5 years ago
- PFI (Port Forwarding Interceptor)☆46Jan 29, 2026Updated 3 weeks ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Feb 26, 2016Updated 10 years ago
- Scripts that aren't PowerShell☆48Jan 13, 2020Updated 6 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- Cross-site request forgery Learning Platform☆21Sep 13, 2014Updated 11 years ago
- Reverseshell Generator☆10Dec 13, 2017Updated 8 years ago
- Ad free DNS server. A docker container with a DNS server configured to block advertisement hosts.☆28Sep 30, 2020Updated 5 years ago
- WeakNet PHP Execution Shell☆31Oct 14, 2015Updated 10 years ago
- ☆86Jul 15, 2015Updated 10 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆58Jun 26, 2015Updated 10 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Dec 27, 2013Updated 12 years ago
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- Capture passwords of login attempts on non-existent and disabled accounts.☆38Aug 17, 2022Updated 3 years ago
- Transmissions over time based covert channels across a network. Modifies the time intervals between packets to transmit data.☆22Jun 26, 2022Updated 3 years ago
- Unix netcat(nc) in Python☆48Apr 16, 2019Updated 6 years ago
- Python script to inject and run shellcodes through TLS callbacks☆49Jun 22, 2015Updated 10 years ago
- A tool used to obfuscate python scripts, bind obfuscated scripts to fixed machine or expire obfuscated scripts.☆4,955Feb 7, 2026Updated 3 weeks ago
- Basic app to practice modsec bypass☆22May 12, 2016Updated 9 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Sep 29, 2015Updated 10 years ago
- This is my implementation of JSRat.ps1 in Python so you can now run the attack server from any OS instead of being limited to a Windows O…☆300May 5, 2016Updated 9 years ago
- Tools for encrypting and decrypting things using Cisco's type 7 encryption.☆15Jan 11, 2013Updated 13 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆215Aug 4, 2020Updated 5 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- [DEPRECATED] An Obfuscator for simple Python 2 Scripts☆35Aug 30, 2017Updated 8 years ago
- A simple tool to dump users in popular forums and CMS :)☆31Jan 30, 2018Updated 8 years ago
- A python script for obfuscating wireless networks☆79Nov 14, 2016Updated 9 years ago
- LNHG - Mass Web Fingerprinter☆63Feb 22, 2016Updated 10 years ago
- An IRC based tool for testing the capabilities of a botnet.☆143Jun 30, 2020Updated 5 years ago
- Bash script to parse multiple Nmap (.gnmap) exports into various plain-text formats for easy analysis.☆66Mar 6, 2013Updated 12 years ago
- Rosie the Pivoter☆17Sep 2, 2018Updated 7 years ago