SusmithKrishnan / neuronLinks
Encrypted chat application in python
☆56Updated 7 years ago
Alternatives and similar repositories for neuron
Users that are interested in neuron are comparing it to the libraries listed below
Sorting:
- Pythonic ransomware proof of concept.☆217Updated 5 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆190Updated 6 years ago
- Basic ransomware proof of concept with Python 3.7.☆57Updated 6 years ago
- Python reverse shell.☆297Updated last year
- Simple python malware for back connect in windows☆58Updated 7 years ago
- A ctypes powered python keylogger.☆107Updated 5 years ago
- Worm implemented in Python☆88Updated 9 years ago
- NXcrypt - 'python backdoor' framework☆367Updated 8 years ago
- some python3 functions to add spreading features to any python backdoor☆55Updated 8 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆222Updated 4 years ago
- Python code to extract chrome cookie, history and login data files☆59Updated 7 years ago
- Open Source Python Keylogger Collection☆183Updated 2 years ago
- steal cookies from firefox cookies database(cookies.sqlite)☆54Updated 10 years ago
- Various codes related to Ransomware Developement☆123Updated 8 years ago
- Capstone: Keylogger Trojan☆35Updated 7 years ago
- Multiplatform payload dropper☆273Updated 4 years ago
- black hat python☆131Updated 4 years ago
- A simple, fully python ransomware PoC☆377Updated 5 years ago
- Python code demonstrating the how-to part of L7 Application DDoS Attack called SlowLoris☆50Updated 8 years ago
- Xenotix Python Keylogger for Windows.☆456Updated 6 years ago
- Control remote computers using discord bot and python 3.☆182Updated 3 years ago
- Cloak can backdoor any python script with some tricks.☆499Updated 6 years ago
- Bug7sec Team - ransomware open source (web)☆132Updated 8 years ago
- Sets Transparent proxy tunnel through Tor, I2P, Privoxy, Polipo and modify DNS; Include Anonymizing Relay Monitor (arm), macchanger and w…☆313Updated 2 years ago
- Chat with hacker assistant☆196Updated 7 years ago
- Inject malicious code into *.debs☆278Updated 3 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆26Updated 8 years ago
- Python 2.7 is obsolete, please use https://github.com/xp4xbox/Python-Keylogger☆50Updated 5 years ago
- A simple bash based metasploit automation tool!☆125Updated 2 years ago
- The Hacker's ToolBox☆188Updated 8 years ago