cy4nguy / PythonReverseShellDotpy
☆23Updated 5 years ago
Alternatives and similar repositories for PythonReverseShellDotpy:
Users that are interested in PythonReverseShellDotpy are comparing it to the libraries listed below
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network☆8Updated 2 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆24Updated 4 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- Undetectable Windows Payload Generation☆10Updated 7 years ago
- Simple class to search and upload files☆27Updated 5 years ago
- Simple way to read wirte delete values from registry☆18Updated 5 years ago
- NooB PyThon Matasploit Av Bypasser By Ali khan☆8Updated 4 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Updated 3 years ago
- The payload will search for specific files in desktop then upload them as *zip to your web server☆34Updated 5 years ago
- Disabling Windows Defender & downloading payload☆20Updated 4 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆28Updated 6 years ago
- 🔅 Reverse shell written on python3☆14Updated 4 years ago
- Some stealers in one. Simple to use.☆6Updated 4 years ago
- Phoenix based exploit kit for educational purpose.☆16Updated 6 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Disable Windows Defender All Version☆31Updated 4 years ago
- HTTP BOTNET☆7Updated last year
- Silent file loader☆14Updated 2 years ago
- C# Admin Control Panel Finder For Windows☆42Updated 5 years ago
- Download payload to disk and install it to startup then melt.☆35Updated 5 years ago
- Python3 script to generate Office macros for the EvilOSX framework. Author: Cedric Owens☆26Updated 4 years ago
- using VBS to download and install a powershell malware☆39Updated 5 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆24Updated 6 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆16Updated 7 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Updated 4 years ago
- KeplerPulse is a tool that generates a Powershell command that once executed on a Machine, Downloads and executes your desired Executable…☆10Updated 3 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Commands to perform various activities related to penetration testing and red teaming☆19Updated 5 years ago
- AgentTesla botnet C&C RCE exploit.☆16Updated 5 years ago