Sq00ky / Password-Protected-Python-BackdoorLinks
A Simple Password Protected Back Door written in Python3
☆21Updated 2 years ago
Alternatives and similar repositories for Password-Protected-Python-Backdoor
Users that are interested in Password-Protected-Python-Backdoor are comparing it to the libraries listed below
Sorting:
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 4 years ago
- ☆16Updated 2 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 5 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 5 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆15Updated 3 years ago
- nmap -> searchploit -> GoBuster/Eyewitness & LDAPsearch & SMBclient & Showmount☆21Updated 5 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 6 years ago
- Scripts for OSCE☆18Updated 6 years ago
- The best way to send emails in Go.☆10Updated 4 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Updated 5 years ago
- Easily-guessable Password Generator for Password Spray Attack☆21Updated 5 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆23Updated 3 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆18Updated 2 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆25Updated 4 years ago
- miscellaneous sploit scripts/hacks☆16Updated 5 months ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 4 years ago
- Finding SSL Blindspots for Red Teams☆32Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 5 years ago
- ☆18Updated 4 years ago
- Generate image payloads in JS to bypass filters☆40Updated 4 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Windows 权限提升 BadPotato☆13Updated 4 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆22Updated last year
- Simple C2 over the Trello API☆38Updated 2 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago