buckyroberts / TurtleLinks
Python reverse shell.
☆294Updated last year
Alternatives and similar repositories for Turtle
Users that are interested in Turtle are comparing it to the libraries listed below
Sorting:
- NXcrypt - 'python backdoor' framework☆366Updated 7 years ago
- Pythonic ransomware proof of concept.☆219Updated 5 years ago
- Xenotix Python Keylogger for Windows.☆456Updated 6 years ago
- Scratch space for various python lessons I am trying to work through☆117Updated 4 years ago
- Python network packet sniffer.☆255Updated last year
- Find your wireless network password in Windows , Linux and Mac OS☆350Updated 4 years ago
- Python logger with multiple features.☆528Updated 3 years ago
- Python network tool, similar to Netcat with custom features.☆194Updated 8 years ago
- A ctypes powered python keylogger.☆106Updated 5 years ago
- A framework for Backdoor development!☆436Updated 7 years ago
- Python Security Scripts☆244Updated 3 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆187Updated 6 years ago
- Open Source Python Keylogger Collection☆181Updated last year
- Encrypted chat application in python☆55Updated 7 years ago
- Create fake AP in Kali with 1 command☆268Updated 9 years ago
- transform your payload.exe into one fake word doc (.ppt)☆468Updated 5 years ago
- hacklib - pentesting, port scanning, and logging in anywhere with Python☆92Updated 5 years ago
- A fully featured Windows backdoor that uses Gmail as a C&C server☆501Updated 5 years ago
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆261Updated 7 years ago
- Cloak can backdoor any python script with some tricks.☆495Updated 6 years ago
- this script automatically install any package for pentest with uptodate tools , and lazy command for run the tools like lazynmap , instal…☆366Updated 8 years ago
- Reverse Shell over TCP backdoor☆50Updated 6 years ago
- Worm implemented in Python☆87Updated 9 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆223Updated 4 years ago
- The Hacker's ToolBox☆188Updated 7 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆372Updated 2 years ago
- 🕷 A lightning fast multithreaded network scanner framework with modules.☆324Updated 5 years ago
- Python 2.7 is obsolete, please use https://github.com/xp4xbox/Python-Keylogger☆50Updated 5 years ago
- "Hacking Secret Ciphers with Python" programs☆350Updated 3 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆524Updated 8 years ago