buckyroberts / Turtle
Python reverse shell.
☆293Updated last year
Alternatives and similar repositories for Turtle:
Users that are interested in Turtle are comparing it to the libraries listed below
- Pythonic ransomware proof of concept.☆216Updated 4 years ago
- Xenotix Python Keylogger for Windows.☆456Updated 6 years ago
- NXcrypt - 'python backdoor' framework☆364Updated 7 years ago
- Open Source Python Keylogger Collection☆175Updated last year
- A ctypes powered python keylogger.☆105Updated 5 years ago
- Create fake AP in Kali with 1 command☆268Updated 9 years ago
- Python network tool, similar to Netcat with custom features.☆194Updated 7 years ago
- The Hacker's ToolBox☆186Updated 7 years ago
- This is an educational computer virus written in Python to demonstrate how replication is done.☆84Updated 7 years ago
- 🕷 A lightning fast multithreaded network scanner framework with modules.☆323Updated 5 years ago
- Scratch space for various python lessons I am trying to work through☆120Updated 4 years ago
- Python logger with multiple features.☆526Updated 3 years ago
- A simple, fully python ransomware PoC☆372Updated 4 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆522Updated 7 years ago
- A fully featured Windows backdoor that uses Gmail as a C&C server☆497Updated 5 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆185Updated 6 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆437Updated 7 years ago
- Malware exploits☆542Updated 5 years ago
- Framework for Man-In-The-Middle attacks☆185Updated 7 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆223Updated 3 years ago
- PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!☆254Updated 7 years ago
- Cloak can backdoor any python script with some tricks.☆488Updated 5 years ago
- Reverse Shell over TCP backdoor☆50Updated 6 years ago
- Inject malicious code into *.debs☆273Updated 2 years ago
- Linux bash script automation for metasploit☆261Updated 5 years ago
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆261Updated 7 years ago
- Undetectable Windows Payload Generation☆1,580Updated 2 years ago
- Remote administration service which uses twitter as a command and control server☆711Updated 4 years ago
- Find your wireless network password in Windows , Linux and Mac OS☆346Updated 4 years ago
- Git all your favorite tools in one click☆263Updated 3 years ago