A Simple Password Protected Back Door written in Python3
☆21Jul 1, 2023Updated 2 years ago
Alternatives and similar repositories for Password-Protected-Python-Backdoor
Users that are interested in Password-Protected-Python-Backdoor are comparing it to the libraries listed below
Sorting:
- Serve assets in zipfiles inside or outside of Redbean☆16Sep 1, 2022Updated 3 years ago
- A library and CLI to solve, check, and generate proof-of-work challenges using kCTF's scheme.☆16Mar 6, 2026Updated 2 weeks ago
- A collection of various capture the flag event write-ups and anomalies☆42Jun 8, 2019Updated 6 years ago
- Multipurpose tool, currently aimed for HackTheBox Battlegrounds☆20Nov 18, 2020Updated 5 years ago
- Integrate proxyrack.com API service using multiple languages☆15Sep 30, 2022Updated 3 years ago
- Get tweets and save file in JSON format without Twitter API☆11Jan 1, 2019Updated 7 years ago
- POC of CVE-2021-2394☆21Aug 2, 2021Updated 4 years ago
- Personal website, darkstar7471.com☆11Dec 16, 2021Updated 4 years ago
- Insecure Vulnerable Android Application that helps to learn hacing and securing apps☆21Oct 4, 2015Updated 10 years ago
- Writeups for NoobCTF 0x1, Dark-PreCTF, Zh3ro-CTF☆20Jun 8, 2021Updated 4 years ago
- Go reverse shell for Win/Linux/OSX☆17May 15, 2019Updated 6 years ago
- Browser agnostic extension that enables pasting into password fields...☆15Jan 12, 2020Updated 6 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆18Feb 1, 2022Updated 4 years ago
- Metasploit_postgresql_database_connection_fix☆12Jan 30, 2019Updated 7 years ago
- Short Python script that attempts to neuter USB Rubber Duckies.☆13Jun 25, 2019Updated 6 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- Cellular Automata-Based Mathematical Model for the Spread of Forest Fires☆19Mar 29, 2020Updated 5 years ago
- Simple Tricks I use While Playing King Of The Hill☆18Apr 10, 2020Updated 5 years ago
- ☆25Jun 11, 2015Updated 10 years ago
- Writeup of what I'm learning with PentesterLab's Bootcamp☆10May 13, 2017Updated 8 years ago
- A Collection of all things Security☆11Sep 24, 2020Updated 5 years ago
- Scripts that are suited for blue teams☆33Mar 17, 2016Updated 10 years ago
- Writeups/exploit code for CTFs I've done☆13Aug 29, 2021Updated 4 years ago
- ☆37Dec 10, 2018Updated 7 years ago
- A fake syskey app for dealing with those pesky tech support scammers☆16Sep 26, 2016Updated 9 years ago
- Post-exploitation NTLM password hash extractor☆19Apr 7, 2021Updated 4 years ago
- SIP hacking tools and scripts☆23Nov 20, 2020Updated 5 years ago
- A script using Docker to quickly bring up some honeypots exposing lots of services. For research, reconnaissance, and fun. (DISCLAIMER ma…☆36Aug 7, 2025Updated 7 months ago
- CVE-2022-32119 - Arox-Unrestricted-File-Upload☆17Dec 20, 2023Updated 2 years ago
- A collection of notes and script that will help you learn basics of hacking with Python☆34Nov 3, 2014Updated 11 years ago
- A simple keylogger made in python☆16Aug 10, 2017Updated 8 years ago
- X-Platform bind shell in TypeScript!☆29Jul 11, 2025Updated 8 months ago
- Multi-thread AzureAD Autologon SSO Password Sprayer.☆37Oct 9, 2021Updated 4 years ago
- Samsung TV Denial of Service (DoS) Attack☆36Nov 18, 2016Updated 9 years ago
- Minimalist template repository. ✨🛠☆30Jul 27, 2024Updated last year
- Password Hashing Competition Submissions☆72Apr 12, 2014Updated 11 years ago
- Malaysia Elite Hacker Team☆11Jan 29, 2025Updated last year