citronneur / rdpy
Remote Desktop Protocol in Twisted Python
☆1,699Updated 3 years ago
Alternatives and similar repositories for rdpy:
Users that are interested in rdpy are comparing it to the libraries listed below
- RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact☆1,617Updated 7 months ago
- Tunna is a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in full…☆1,246Updated 2 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆1,358Updated 2 years ago
- Simple reverse ICMP shell☆1,567Updated 6 years ago
- A PoC backdoor that uses Gmail as a C&C server☆1,327Updated 6 years ago
- A fully featured backdoor that uses Twitter as a C&C server☆768Updated 4 years ago
- Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors☆3,338Updated last year
- (extensible) Data Exfiltration Toolkit (DET)☆826Updated 7 years ago
- Sniffs sensitive data from interface or pcap☆1,720Updated last year
- python script setting up a transparent proxy to forward all TCP and DNS traffic through a SOCKS / SOCKS5 or HTTP(CONNECT) proxy using ipt…☆349Updated 2 years ago
- UAC bypass, Elevate, Persistence methods☆2,648Updated last year
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,413Updated last year
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆995Updated 3 years ago
- Kippo - SSH Honeypot☆1,640Updated last year
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆1,841Updated 2 weeks ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,206Updated 4 years ago
- Python Decoders for Common Remote Access Trojans☆1,077Updated 6 months ago
- DNS Exfiltration tool for stealthily sending files over DNS requests.☆1,692Updated 2 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,589Updated 4 years ago
- Malicious HTTP traffic explorer☆714Updated last year
- Veil Evasion is no longer supported, use Veil 3.0!☆1,831Updated 3 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆985Updated 7 years ago
- netshell features all in version 2 powershell☆2,178Updated 10 months ago
- A framework for Backdoor development!☆436Updated 6 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,298Updated 3 years ago
- ☆3,501Updated 10 months ago
- Binary analysis and management framework☆1,544Updated last year
- A tool for security professionals to access and interact with remote Microsoft Windows based systems.☆431Updated 7 years ago
- Decrypted content of odd.tar.xz.gpg, swift.tar.xz.gpg and windows.tar.xz.gpg☆1,889Updated 7 years ago
- Python low-interaction honeyclient☆1,004Updated this week