SusmithKrishnan / neuron
Encrypted chat application in python
☆55Updated 6 years ago
Alternatives and similar repositories for neuron:
Users that are interested in neuron are comparing it to the libraries listed below
- Python code to extract chrome cookie, history and login data files☆58Updated 7 years ago
- A ctypes powered python keylogger.☆104Updated 5 years ago
- Pythonic ransomware proof of concept.☆217Updated 4 years ago
- ssh management tool to provides commandline access to a remote system running SSH server☆76Updated 6 years ago
- steal cookies from firefox cookies database(cookies.sqlite)☆55Updated 9 years ago
- some python3 functions to add spreading features to any python backdoor☆51Updated 8 years ago
- Capstone: Keylogger Trojan☆35Updated 6 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆225Updated 3 years ago
- Simple python malware for back connect in windows☆57Updated 6 years ago
- ☆31Updated 10 years ago
- Python script based on aireplay-ng to keep deauthenticating the specified stations from your WiFi network.☆50Updated 8 years ago
- Orb is a massive footprinting tool.☆45Updated 5 years ago
- A simple python reverse shell written just for fun.☆64Updated 2 years ago
- Hacking as per the book☆34Updated 6 years ago
- Prints the IPs on your local network that're sending the most packets☆148Updated 3 years ago
- A simple trojan in python, disguised as an animated ASCII bunny (for pedagogical purposes)☆47Updated 3 years ago
- A Python program that scans RAM.☆39Updated 10 years ago
- Seeing how easy it is to create ransomware.☆46Updated 2 years ago
- An IRC bot written in Python.☆73Updated 3 weeks ago
- A simple as possible man in the middle written in python using scapy☆9Updated 6 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆184Updated 6 years ago
- Phishing webapp generator☆41Updated 6 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆147Updated 4 years ago
- Various codes related to Ransomware Developement☆122Updated 7 years ago
- simple reverse tcp backdoor hack☆63Updated 4 years ago
- Powershell Reverse Rubber Ducky☆55Updated 9 years ago
- Bind 2 exe's and have them run at the same time.☆46Updated 10 years ago
- An IRC based tool for testing the capabilities of a botnet.☆141Updated 4 years ago
- Exploit using barcodes, QRcodes, earn13, datamatrix☆111Updated 8 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆25Updated 8 years ago