Hollywood-style CCTV hacking - PoC
☆39May 30, 2020Updated 5 years ago
Alternatives and similar repositories for Pyllywood
Users that are interested in Pyllywood are comparing it to the libraries listed below
Sorting:
- A golang CLI to setup honey pots https://en.wikipedia.org/wiki/Honeypot_(computing)☆16Jul 19, 2020Updated 5 years ago
- Python Remote Administration Tool With GUI☆18Jun 6, 2023Updated 2 years ago
- AES Ransomware in batch☆11Jun 25, 2024Updated last year
- Get latest Exploit Databases notification on your Desktop☆16Jan 29, 2020Updated 6 years ago
- Fastly scans open ports on large networks and bruteforce login mechanism of found services☆12Aug 24, 2019Updated 6 years ago
- A simple reverse shell in Nim langauge. It should bypass AV-s (don't submit binaries)☆16Oct 10, 2019Updated 6 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Sep 22, 2021Updated 4 years ago
- GitHub action to run Go lint checks on PR event☆10Aug 22, 2019Updated 6 years ago
- Command-line Remote Access Tool (RAT)☆13Jul 1, 2020Updated 5 years ago
- Simple but sharp ransomware☆35Jul 11, 2020Updated 5 years ago
- A lookup tool created to explore the NJ Arrest file from the FBI. Created for Hack Jersey 2.0☆14Apr 1, 2015Updated 10 years ago
- Vulnerable Bank Web Application for Cyber Security Course☆13Dec 11, 2022Updated 3 years ago
- A tool to speed up Android pentesting by automating the APK acquisition and information gathering☆18Jul 6, 2022Updated 3 years ago
- 🐐 Intrusion Detection System☆17Jan 10, 2023Updated 3 years ago
- Python RAT with reverse connection and asymmetric encrypted communications☆16Jun 30, 2020Updated 5 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Sep 6, 2019Updated 6 years ago
- 📝 Instagram Info Scraper☆14Mar 3, 2021Updated 5 years ago
- Python proof-of-concept for breaking passwords with a microphone, using machine learning.☆22Dec 29, 2019Updated 6 years ago
- 🎥 Brickcom Private Security Cam's Scan and Exploit Improper view DataBase 📺 Watching priv8 (records 📼) in real time from almost countr…☆20Jan 16, 2019Updated 7 years ago
- ThreatTrack | Shodan + ExploitDB + GitHub + NVD☆17Jul 16, 2024Updated last year
- Simple keylogger on C++ with several functions.☆16Jun 19, 2020Updated 5 years ago
- Escalation Servers and Scripts for Priv Escalation☆18Jul 20, 2019Updated 6 years ago
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Mar 3, 2017Updated 9 years ago
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆16Dec 14, 2020Updated 5 years ago
- ☆17Mar 21, 2019Updated 6 years ago
- A library to encrypt / decrypt with AES (Rijndael) between C# Net Core and JavaScript and securely hash with Scrypt☆20Dec 8, 2022Updated 3 years ago
- Starting Code for my How to Write Malware 101 Class. This is a Proof of Concept of a C# RAT (Remote Access Trojan) made by Sean Pierce (@…☆21May 29, 2018Updated 7 years ago
- Hack Cctv Vuln 2020☆42Apr 6, 2020Updated 5 years ago
- ☆10Jun 24, 2020Updated 5 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 7 years ago
- A simple tool to build and publish multi-arch images on the Docker Hub.☆21Mar 25, 2024Updated last year
- One Time Password Generator tool that is meant to be used on CLI.☆21Jul 18, 2020Updated 5 years ago
- Android Hacking Framework to generate apk with backdoor, Works on both WAN and LAN☆19Jun 19, 2022Updated 3 years ago
- Pentesting Suite Deployer for Raspbian Stretch☆25Jun 20, 2018Updated 7 years ago
- HashExpoit is Great Tool For Cracking Hash☆28Jul 15, 2020Updated 5 years ago
- Ospy is a penetration testing tool for macOS, include keylogger, live screen catcher, reveres shell and more. Developed in c☆24May 18, 2019Updated 6 years ago
- Create Evil Twin network that deauthernticates victims to force them to connect to your evil AP.☆27May 21, 2021Updated 4 years ago
- A simple backdoor in (ba)sh with encrypted communication channel☆26Dec 16, 2016Updated 9 years ago
- A new and improved DeadTrap with more efficient time span for scanning a number☆31Sep 27, 2020Updated 5 years ago