Sq00ky / Password-Protected-Python-BackdoorLinks
A Simple Password Protected Back Door written in Python3
☆21Updated 2 years ago
Alternatives and similar repositories for Password-Protected-Python-Backdoor
Users that are interested in Password-Protected-Python-Backdoor are comparing it to the libraries listed below
Sorting:
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 4 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 4 years ago
- ☆19Updated 4 years ago
- Collection of bash scripts I wrote to make my life easier or test myself that you may find useful.☆39Updated last year
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- The Last Web Recon Tool You'll Need☆17Updated 5 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- ☆17Updated 3 years ago
- Information-Gathering Shell Script☆30Updated 5 years ago
- DNS hijacking via dead records automation tool☆53Updated 4 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆64Updated 5 years ago
- Active Directory information dumper via LDAP☆13Updated 5 years ago
- Anonymize your hashcat formatted files for online cracking☆31Updated last year
- PowerShell payload generator☆118Updated 4 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆108Updated last year
- Easily-guessable Password Generator for Password Spray Attack☆20Updated 5 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆25Updated 5 years ago
- Subdomain Enumeration and Scanner☆34Updated 5 years ago
- Import Nmap scans to Cherrytree☆37Updated 3 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Updated 5 years ago
- ☆54Updated 4 years ago
- Tool for finding Buffer Overflows in simple binaries. CTF use mainly.☆20Updated 7 years ago
- Takes unallocated memory and fills it with junk to mess with forensics tools.☆13Updated last year
- nmap -> searchploit -> GoBuster/Eyewitness & LDAPsearch & SMBclient & Showmount☆21Updated 5 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- Ease and assist the compromise of an Active Directory environment.☆30Updated 4 years ago
- Generate image payloads in JS to bypass filters☆39Updated 4 years ago
- A reverse shell in PHP using Unicode encoding as variable assignment☆19Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆30Updated 3 years ago