THSamurai / TorKill
β19Updated 6 years ago
Alternatives and similar repositories for TorKill:
Users that are interested in TorKill are comparing it to the libraries listed below
- Stealer of sessions of the Telegram Desktop application on windows 7, 8 and 10 πβ9Updated 4 years ago
- gui tool to create normal payload by msfvenomβ32Updated 6 years ago
- β19Updated 7 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.β16Updated 4 years ago
- Automate the creation of Backdoors and postexplotation activitiesβ22Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigationsβ17Updated 4 years ago
- Search-Scan-Save-Notifyβ12Updated 3 years ago
- Webdav Mass Exploiter With Python Programming Languageβ13Updated 6 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.β15Updated 2 years ago
- pen testing scriptsβ11Updated 4 years ago
- Phoenix based exploit kit for educational purpose.β17Updated 6 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits keyβ28Updated 6 years ago
- best framework for information gathering ,pentesting and web aplication scannerβ9Updated 6 years ago
- Full Auto Exploit tool to SQL Injection: Admin Find -dork generation and grab from cx-Security and proxy cheaker and more :)β28Updated 7 years ago
- Some stealers in one. Simple to use.β6Updated 4 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.β12Updated 9 months ago
- Free Advance encryptor for Anon Cloudβ17Updated 2 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a decβ¦β32Updated 5 years ago
- β13Updated 7 years ago
- Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3β13Updated 3 years ago
- CRACK AND CHECK HASH TYPES IN BULKβ12Updated 3 years ago
- Python RAT with reverse connection and asymmetric encrypted communicationsβ15Updated 4 years ago
- Webshell Jumping Editionβ28Updated 7 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Freeβ21Updated 5 years ago
- Bypass Windows Defender with py2exe from memory.β36Updated 3 years ago
- NooB PyThon Matasploit Av Bypasser By Ali khanβ8Updated 4 years ago
- An advanced reverse shell written in Python3.β21Updated 4 years ago
- POC for scanning ProxyShell(CVE-2021-34523,CVE-2021-34473,CVE-2021-31207)β17Updated 3 years ago
- first program python to steal password microsoft edge all version browser, send info to emailβ15Updated 4 years ago
- FUD MSFVenom Payload Gen. CatchYou 2 is a fork from CatchYou by TheLinuxChoice.β13Updated 4 years ago