guilhermej / scantime_py_crypterLinks
A Scantime Crypter coded in Python 2.7
☆15Updated 7 years ago
Alternatives and similar repositories for scantime_py_crypter
Users that are interested in scantime_py_crypter are comparing it to the libraries listed below
Sorting:
- HTTP botnet☆62Updated 9 years ago
- Bind 2 exe's and have them run at the same time.☆46Updated 10 years ago
- some python3 functions to add spreading features to any python backdoor☆54Updated 8 years ago
- Kill Any Antivirus Using Python For Windows Users .☆45Updated 9 years ago
- Backdoor en powershell vía Telegram☆30Updated 8 years ago
- pinky - The PHP mini RAT (Remote Administration Tool)☆77Updated 6 years ago
- A simple utility to convert EXE files to JPEG images and vice versa.☆201Updated 9 years ago
- The Python Password-Protected Obfuscator☆34Updated 6 years ago
- Python script for trying default passwords for some TP-Link Hotspots☆35Updated 4 years ago
- Telegram BotNet☆36Updated last year
- Windows/Linux - ReverseShellBackdoor Framework☆50Updated 6 years ago
- AutoIt HackTool, Shortcuts .lnk Payloads Generator As LNK-KISSER.☆104Updated 7 years ago
- Red Login: SSH Brute-force Tools☆103Updated 7 years ago
- TeleShadow - Telegram Desktop Session Stealer (Windows)☆116Updated 7 years ago
- Example crypter is a project demonstrating how files can be encrypted and injected into memory using a stub file.☆17Updated 8 years ago
- This is a cross-platform Python 2.x Remote Access Trojan (RAT)☆16Updated 8 years ago
- An advanced reverse shell written in Python3.☆22Updated 4 years ago
- Embedding a "UAC-Bypassing" function into your custom payload☆99Updated 2 years ago
- A ctypes powered python keylogger.☆106Updated 5 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134Updated 6 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- A simple python reverse shell written just for fun.☆65Updated 2 years ago
- Experimental examples of Ransomware in different languages☆37Updated 7 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- O Scanner vai procurar erros padrões do script SQLI(MySQL,MS ACCESS,Microsoft SQL Server,ORACLE,POSTGRESQL) OU ERROS DE PROGRAMAÇÃO. …☆26Updated 11 years ago
- A tool to mass scan SQL Injection Vulnerable websites from a file.☆71Updated 8 years ago
- Phishing webapp generator☆42Updated 6 years ago
- 🎥 Brickcom Private Security Cam's Scan and Exploit Improper view DataBase 📺 Watching priv8 (records 📼) in real time from almost countr…☆19Updated 6 years ago
- Orwell is a RAT and Botnet designed as a trio of programs by Landon Powell.☆32Updated 8 years ago
- Framework for exploiting local vulnerabilities☆84Updated last year