alexAubin / evilBunnyTrojan
A simple trojan in python, disguised as an animated ASCII bunny (for pedagogical purposes)
☆47Updated 3 years ago
Alternatives and similar repositories for evilBunnyTrojan:
Users that are interested in evilBunnyTrojan are comparing it to the libraries listed below
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆55Updated 6 years ago
- Python backdoor that uses http post/get requests to communicate☆40Updated 8 years ago
- WPS scan and pwn tool☆66Updated 5 years ago
- A ctypes powered python keylogger.☆105Updated 5 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆57Updated 9 years ago
- ssh management tool to provides commandline access to a remote system running SSH server☆75Updated 6 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆147Updated 4 years ago
- Security scripts and programs I've made☆8Updated 10 years ago
- A python based dropper, that uses steganography and an image over http to transfer a file☆58Updated 9 years ago
- A simple tool to dump users in popular forums and CMS :)☆29Updated 7 years ago
- Easy Window domain access☆51Updated 10 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆44Updated 5 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26Updated 8 years ago
- A python based https remote access trojan for penetration testing☆84Updated 9 years ago
- Phishing webapp generator☆41Updated 6 years ago
- Automatically exported from code.google.com/p/unix-security-file-parser☆34Updated 9 years ago
- Simple security surveillance script for linux distributions.☆58Updated 8 years ago
- Small backdoor using cookie.☆60Updated 8 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆83Updated 6 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆21Updated 8 years ago
- Mailing Phishing Framework - This Branch is UNSTABLE :: Official STABLE master branch at https://github.com/Section9Labs/Cartero☆48Updated 7 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆67Updated 9 years ago
- Credentials recovery project☆44Updated 8 years ago
- Powershell Reverse Rubber Ducky☆55Updated 9 years ago
- Metasploit Usage Wiki☆48Updated 10 years ago
- Search google for shellshock vulnerable sites☆27Updated 10 years ago
- Simple Bash Rasomware for use in Cyber Exercises☆115Updated 8 years ago
- This is a pack of Cortana scripts commonly used on our pentests.☆68Updated 10 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆61Updated 9 years ago
- bash script to help you , doing many penetration testing based on kali linux , help pentester and hackers to deal with kali linux in easy…☆17Updated 9 years ago