cys3c / EvilOSXLinks
A pure python, post-exploitation, remote administration tool (RAT) for macOS / OS X.
☆47Updated 8 years ago
Alternatives and similar repositories for EvilOSX
Users that are interested in EvilOSX are comparing it to the libraries listed below
Sorting:
- Kill Any Antivirus Using Python For Windows Users .☆45Updated 9 years ago
- Remote Administration Tool for Windows☆18Updated 9 years ago
- Social Engineering Toys☆36Updated 9 years ago
- Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.☆22Updated 9 years ago
- Package manager for hackers built by hackers☆36Updated 6 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆40Updated 9 years ago
- Massive arsenal of hacker tools...☆79Updated 7 years ago
- Metasploit/MSFVenom Payload Generator Stand Alone☆32Updated 8 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆83Updated 4 years ago
- Remote access trojan created using WinRar with firefox installer and python Reverse Shell embedded.☆27Updated 5 years ago
- A quick, dirty, and effective USB RubberDucky (hak5.com) firmware programming script. Cause typing is hard.☆20Updated 11 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆37Updated 5 years ago
- A python tool that will extract exif data from picture with two methods☆39Updated 3 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆37Updated 9 years ago
- python remote access trojan☆37Updated 8 years ago
- Simple security surveillance script for linux distributions.☆60Updated 8 years ago
- Loki.Rat is a fork of the Ares RAT, it integrates new modules, like recording , lockscreen , and locate options. Loki.Rat is a Python Rem…☆77Updated 2 years ago
- wifi attacks suite☆59Updated 4 years ago
- Python - Human Interface Device Android Attack Framework☆47Updated 8 years ago
- iSpy Keylogger☆43Updated 8 years ago
- Samsung TV Denial of Service (DoS) Attack☆36Updated 8 years ago
- Autosploit = Automating Metasploit Modules.☆77Updated 6 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Updated 9 years ago
- Get clients and access points.☆49Updated 6 years ago
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆35Updated 8 years ago
- SimpleEmail is a email recon tool that is fast and easy framework to build on☆44Updated 9 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- SMS Phishing Tools☆79Updated 8 years ago
- giskismet – Wireless recon visualization tool☆55Updated 9 years ago
- Hacking environment installation scripts for OS X☆27Updated 3 years ago