buckyroberts / TurtleLinks
Python reverse shell.
☆298Updated last year
Alternatives and similar repositories for Turtle
Users that are interested in Turtle are comparing it to the libraries listed below
Sorting:
- Xenotix Python Keylogger for Windows.☆457Updated 6 years ago
- Python logger with multiple features.☆525Updated 4 years ago
- NXcrypt - 'python backdoor' framework☆367Updated 8 years ago
- Pythonic ransomware proof of concept.☆218Updated 5 years ago
- Python network tool, similar to Netcat with custom features.☆197Updated 8 years ago
- A simple, fully python ransomware PoC☆376Updated 5 years ago
- Scratch space for various python lessons I am trying to work through☆116Updated 5 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆190Updated 7 years ago
- Remote administration service which uses twitter as a command and control server☆715Updated 4 years ago
- Encrypted chat application in python☆56Updated 7 years ago
- This is an open source tool to dump the wifi profiles and cleartext passwords of the connected access points on the Windows machine. This…☆290Updated 8 years ago
- 🕷 A lightning fast multithreaded network scanner framework with modules.☆324Updated 5 years ago
- DNS spoofer. Drops DNS responses from the router and replaces it with the spoofed DNS response☆287Updated 8 years ago
- Find your wireless network password in Windows , Linux and Mac OS☆354Updated 4 years ago
- A ctypes powered python keylogger.☆108Updated 5 years ago
- Framework for Man-In-The-Middle attacks☆189Updated 8 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆223Updated 4 years ago
- A fully featured Windows backdoor that uses Gmail as a C&C server☆506Updated 6 years ago
- Open Source Python Keylogger Collection☆189Updated 2 years ago
- Python clone of arpspoof that can poison hosts via arp-requests as well as arp-replies☆198Updated 6 years ago
- Cloak can backdoor any python script with some tricks.☆500Updated 6 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆439Updated 8 years ago
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆261Updated 7 years ago
- Create fake AP in Kali with 1 command☆269Updated 9 years ago
- 🔓 A dynamic dictionary merger for successful dictionary based attacks.☆227Updated 4 years ago
- transform your payload.exe into one fake word doc (.ppt)☆467Updated 5 years ago
- Python script to decrypt saved Chrome usernames and passwords on windows☆287Updated 4 years ago
- Python 2.7 is obsolete, please use https://github.com/xp4xbox/Python-Keylogger☆50Updated 5 years ago
- Get all passwords stored by Chrome on WINDOWS.☆174Updated 6 years ago
- Chat with hacker assistant☆196Updated 7 years ago