citronneur / rdpyLinks
Remote Desktop Protocol in Twisted Python
☆1,734Updated 4 years ago
Alternatives and similar repositories for rdpy
Users that are interested in rdpy are comparing it to the libraries listed below
Sorting:
- RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact☆1,749Updated 5 months ago
- Tunna is a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in full…☆1,271Updated 3 years ago
- A PoC backdoor that uses Gmail as a C&C server☆1,343Updated 7 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆1,384Updated 3 years ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆1,009Updated 4 years ago
- A fully featured backdoor that uses Twitter as a C&C server☆785Updated 5 years ago
- Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors☆3,424Updated 2 years ago
- Sniffs sensitive data from interface or pcap☆1,804Updated 2 years ago
- python script setting up a transparent proxy to forward all TCP and DNS traffic through a SOCKS / SOCKS5 or HTTP(CONNECT) proxy using ipt…☆349Updated 3 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,443Updated last month
- Simple reverse ICMP shell☆1,612Updated 7 years ago
- DNS Exfiltration tool for stealthily sending files over DNS requests.☆1,736Updated 3 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,322Updated 4 years ago
- Kippo - SSH Honeypot☆1,708Updated 2 years ago
- A post-exploitation powershell tool for extracting juicy info from memory.☆1,864Updated last year
- libnmap is a python library to run nmap scans, parse and diff scan results. It supports python 2.7 up to 3.8. It's wonderful.☆492Updated 11 months ago
- A framework for Backdoor development!☆434Updated 7 years ago
- A python2 script for sweeping a network to find windows systems compromised with the DOUBLEPULSAR implant.☆1,027Updated 5 years ago
- Python and Powershell internal penetration testing framework☆720Updated 9 years ago
- Veil Evasion is no longer supported, use Veil 3.0!☆1,843Updated 4 years ago
- Malicious HTTP traffic explorer☆724Updated 2 years ago
- Exploit the credentials present in files and memory☆844Updated 2 years ago
- A fully featured Windows backdoor that uses Gmail as a C&C server☆506Updated 6 years ago
- A PowerShell TCP/IP swiss army knife.☆570Updated 8 years ago
- Secure Socket Funneling - Network tool and toolkit - TCP and UDP port forwarding, SOCKS proxy, remote shell, standalone and cross platfor…☆1,659Updated 4 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆831Updated 8 years ago
- A python reverse shell that uses DNS as the c2 channel☆506Updated 10 years ago
- DHCP exhaustion script written in python using scapy network library☆352Updated last month
- powerful auto-backdooring utility☆751Updated 8 years ago
- A post-exploitation OS X/Linux agent written in Python 2.7☆872Updated 8 years ago