A simple implementation of a trojan malware in python
☆25Sep 16, 2021Updated 4 years ago
Alternatives and similar repositories for python-trojan
Users that are interested in python-trojan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Just a simple ransomware in python with a command and control server (C2) that is running flask☆33Aug 6, 2021Updated 4 years ago
- ☆14Jun 16, 2020Updated 5 years ago
- FB-PHISH is a phishing tool of FACEBOOK intented only that will work perfectly.☆10Dec 14, 2023Updated 2 years ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- Writeups for Vulnhub, Tryhackme and Others☆13Jun 25, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- Hacks through Khan Academy lessons☆15Dec 27, 2023Updated 2 years ago
- Don't just be a script Kiddie☆12Apr 19, 2023Updated 2 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- A VS Code Extension to import USB Rubber Ducky keystroke injection payloads quickly!☆14Aug 29, 2023Updated 2 years ago
- HackRF Sweep Spectrum Analyzer☆13Apr 21, 2025Updated 11 months ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- Module for encrypting and decrypting files.☆14Dec 17, 2015Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- Subdomain crawler with wordlist using python☆14Mar 22, 2020Updated 6 years ago
- Code from Chris Valasek @nudehaberdasher and Charlie Miller @0xcharlie car hack: http://blog.ioactive.com/2013/08/car-hacking-content.ht…☆15Oct 1, 2020Updated 5 years ago
- A parser combinator in Ruby, with a pretty DSL☆11Jun 25, 2017Updated 8 years ago
- Run Kali Linux and BlackArch using Termux with proot-distro☆12Jul 23, 2025Updated 8 months ago
- Langchain_CrewAI_Gemini - An Gemini AI powered AI Agent (Multi-Agent) Project.☆14Mar 24, 2024Updated 2 years ago
- ☆16Mar 26, 2023Updated 3 years ago
- Official payload library for the O.MG line of products from Mischief Gadgets☆10Aug 22, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- This DuckyScript, created by ooovenenoso, automates the removal of problematic CrowdStrike files causing BSOD on Windows. The script open…☆12Jul 23, 2024Updated last year
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- A lexer and parser for Sleep☆20Feb 20, 2026Updated last month
- Python tools for ethical hacking☆45Jul 14, 2019Updated 6 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- This contains common OSCP local exploits and enumeration scripts☆12Sep 18, 2015Updated 10 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Nov 22, 2019Updated 6 years ago
- Networking Tools for Calculations & Scans☆12Dec 11, 2023Updated 2 years ago
- Powerful Rat/Botnet written C/C++ and Rust works on Windows, Linux and Mac OS, Android and IOT Devices Central / P2P Architecture. (Proje…☆11Jul 26, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- 🧑🏾🚀 HardHacker Theme for Wezterm 🌈☆10Sep 20, 2023Updated 2 years ago
- Enter Product Key Volatile Environment LPE☆13Jun 28, 2025Updated 9 months ago
- DEFCON 30 Car Hacking Village Presentation☆11Sep 11, 2022Updated 3 years ago
- ☆22Jan 13, 2025Updated last year
- CVE-2023-28121 - WooCommerce Payments < 5.6.2 - Unauthenticated Privilege Escalation [ Mass Add Admin User ]☆12Jul 14, 2023Updated 2 years ago
- gzip middleware for ASGI applications, extracted from Starlette☆12Updated this week
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Oct 13, 2022Updated 3 years ago