buckyroberts / TurtleLinks
Python reverse shell.
☆297Updated last year
Alternatives and similar repositories for Turtle
Users that are interested in Turtle are comparing it to the libraries listed below
Sorting:
- Xenotix Python Keylogger for Windows.☆456Updated 6 years ago
- Pythonic ransomware proof of concept.☆217Updated 5 years ago
- NXcrypt - 'python backdoor' framework☆367Updated 8 years ago
- A simple, fully python ransomware PoC☆377Updated 5 years ago
- Python logger with multiple features.☆525Updated 4 years ago
- Scratch space for various python lessons I am trying to work through☆117Updated 4 years ago
- Python network tool, similar to Netcat with custom features.☆195Updated 8 years ago
- A ctypes powered python keylogger.☆107Updated 5 years ago
- Encrypted chat application in python☆56Updated 7 years ago
- Open Source Python Keylogger Collection☆183Updated 2 years ago
- 🕷 A lightning fast multithreaded network scanner framework with modules.☆323Updated 5 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆190Updated 6 years ago
- Python script to decrypt saved Chrome usernames and passwords on windows☆287Updated 4 years ago
- A fully featured Windows backdoor that uses Gmail as a C&C server☆507Updated 6 years ago
- Python code to extract chrome cookie, history and login data files☆59Updated 7 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆222Updated 4 years ago
- Find your wireless network password in Windows , Linux and Mac OS☆353Updated 4 years ago
- Get all passwords stored by Chrome on WINDOWS.☆174Updated 6 years ago
- Remote administration service which uses twitter as a command and control server☆715Updated 4 years ago
- Framework for Man-In-The-Middle attacks☆189Updated 8 years ago
- This is an educational computer virus written in Python to demonstrate how replication is done.☆84Updated 8 years ago
- A Simple Multi-Threaded SSH Brute Forcer☆276Updated 5 years ago
- Various codes related to Ransomware Developement☆123Updated 8 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆441Updated 8 years ago
- transform your payload.exe into one fake word doc (.ppt)☆467Updated 5 years ago
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆261Updated 7 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆372Updated 2 years ago
- Python 2.7 is obsolete, please use https://github.com/xp4xbox/Python-Keylogger☆50Updated 5 years ago
- Simple brute forcing in Python.☆104Updated 2 years ago
- Cloak can backdoor any python script with some tricks.☆499Updated 6 years ago