buckyroberts / Turtle
Python reverse shell.
☆293Updated last year
Alternatives and similar repositories for Turtle:
Users that are interested in Turtle are comparing it to the libraries listed below
- Xenotix Python Keylogger for Windows.☆456Updated 6 years ago
- Pythonic ransomware proof of concept.☆218Updated 4 years ago
- NXcrypt - 'python backdoor' framework☆364Updated 7 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆186Updated 6 years ago
- A simple, fully python ransomware PoC☆373Updated 4 years ago
- 🕷 A lightning fast multithreaded network scanner framework with modules.☆324Updated 5 years ago
- Python logger with multiple features.☆527Updated 3 years ago
- Open Source Python Keylogger Collection☆176Updated last year
- A ctypes powered python keylogger.☆105Updated 5 years ago
- Find your wireless network password in Windows , Linux and Mac OS☆349Updated 4 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆225Updated 3 years ago
- The Hacker's ToolBox☆186Updated 7 years ago
- Python Security Scripts☆244Updated 3 years ago
- Encrypted chat application in python☆55Updated 7 years ago
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆261Updated 7 years ago
- Scratch space for various python lessons I am trying to work through☆117Updated 4 years ago
- Remote administration service which uses twitter as a command and control server☆711Updated 4 years ago
- Python Remote Administration Tool (RAT) to gain meterpreter session☆605Updated 5 months ago
- ☆281Updated 10 years ago
- This is an educational computer virus written in Python to demonstrate how replication is done.☆85Updated 8 years ago
- hacklib - pentesting, port scanning, and logging in anywhere with Python☆92Updated 5 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆371Updated last year
- A framework for Backdoor development!☆437Updated 7 years ago
- [unmaintained] Post-exploitation tool☆185Updated 9 years ago
- Cloak can backdoor any python script with some tricks.☆489Updated 5 years ago
- Linux backdoor implementation written in Python☆57Updated 9 years ago
- Collection of scripts to aid in delivering payloads via Office Macros. Most are python. See http://khr0x40sh.wordpress.com for details.☆406Updated 8 years ago
- Python2 / BASH / VBS- UAC D&E Rubber Ducky☆62Updated 6 years ago
- Powershell Reverse Rubber Ducky☆55Updated 9 years ago
- Framework for Man-In-The-Middle attacks☆185Updated 8 years ago