leetCipher / python-trojanLinks
A simple implementation of a trojan malware in python
☆23Updated 4 years ago
Alternatives and similar repositories for python-trojan
Users that are interested in python-trojan are comparing it to the libraries listed below
Sorting:
- Just a simple ransomware in python with a command and control server (C2) that is running flask☆32Updated 4 years ago
- Clipboard poisoning attack.☆59Updated 5 years ago
- Hacking every email by use script Mr.Robot☆54Updated 7 years ago
- KeyloggerScreenshot is an intelligent tool which logs keys, makes a Screenshot every 20 seconds, recordes the mouse click with x and y po…☆87Updated 5 months ago
- Remot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to exploit a system or server that ru…☆17Updated 6 years ago
- This is power full BotNet☆40Updated 2 years ago
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆78Updated last year
- This is a tool to obfuscate / to make your python code unreadable. It obfuscates your code and prevents easy access of others to your cod…☆43Updated 9 months ago
- FAST WEB APPLICATION VULNERABILITY SCANNER written in python3☆22Updated 2 years ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆78Updated last year
- A tool for automatically change the Tor IP address over time.☆98Updated 5 months ago
- A simple and efficent script to obfuscate python payloads to make it completely FUD☆38Updated last year
- Hacking with PasteJacking technique☆22Updated last year
- Information Gathering Simplified.☆71Updated 2 years ago
- Block excessive crawlers, bots and spiders traffic on your web site 👾☆34Updated 2 years ago
- VOID is for scanning and hacking. There is many popular tools in VOID. You can scan web databases and vulnerabilities. Also you can brute…☆36Updated 3 years ago
- Rogue access point tool.☆59Updated 3 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆63Updated 4 years ago
- Windows Hacking FrameWork using Reverse Shell☆107Updated 6 months ago
- Jarbou3 is rat tool coded in python with C&C which can accept multiple connections from clients☆26Updated last year
- A python trojan with spyware, info stealing and ransomware abilities.☆30Updated last week
- A computer programming AI bot in python django☆53Updated last year
- 🚀 This is a collection of hacking🔥 and pentesting 🧐 scripts to help with enumeration, OSINT, exploitation and post exploitation autom…☆180Updated last year
- A simple port scanner using python☆16Updated 2 years ago
- 🕵️ Track down social media profiles using a specific username across multiple social network platforms☆60Updated 2 months ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆50Updated last year
- Auto Scanner and Auto exploiter web app tool V4 Leaked by #GhostSec☆63Updated 4 years ago
- Proof of concept denial of service over TOR stress test tool☆41Updated 7 years ago
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆26Updated 3 years ago
- Mr. Robot's EvilCorp Terminal style for your shell☆40Updated 9 years ago