A simple implementation of a trojan malware in python
☆25Sep 16, 2021Updated 4 years ago
Alternatives and similar repositories for python-trojan
Users that are interested in python-trojan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Just a simple ransomware in python with a command and control server (C2) that is running flask☆33Aug 6, 2021Updated 4 years ago
- MFIN7036 NLP Course Project☆10Jul 25, 2024Updated last year
- FB-PHISH is a phishing tool of FACEBOOK intented only that will work perfectly.☆10Dec 14, 2023Updated 2 years ago
- Website Component : Popup Modal Made using HTML CSS and JavaScipt.☆14May 17, 2023Updated 2 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- Code and notes regarding Malware Development☆11Oct 30, 2022Updated 3 years ago
- Writeups for Vulnhub, Tryhackme and Others☆13Jun 25, 2023Updated 2 years ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- Don't just be a script Kiddie☆12Apr 19, 2023Updated 3 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Discord Gen Bot Tutorial☆10Jun 18, 2024Updated last year
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- HackRF Sweep Spectrum Analyzer☆14Apr 21, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Module for encrypting and decrypting files.☆14Dec 17, 2015Updated 10 years ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- Subdomain crawler with wordlist using python☆14Mar 22, 2020Updated 6 years ago
- Windows based version of the popular app Ls Droid used for flashing the 99-07 General Motors V8 Engine Computers☆11Jan 31, 2021Updated 5 years ago
- SDR-TRX is an experimental low-cost digital mode ham radio HF transceiver.☆14Jan 6, 2025Updated last year
- Run Kali Linux and BlackArch using Termux with proot-distro☆12Jul 23, 2025Updated 9 months ago
- ☆16Mar 26, 2023Updated 3 years ago
- Android based program to read and eventually write the 99-07 GM P01 and P59 computers used on the 24x LS engine.☆12Oct 28, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- This DuckyScript, created by ooovenenoso, automates the removal of problematic CrowdStrike files causing BSOD on Windows. The script open…☆12Jul 23, 2024Updated last year
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- A lexer and parser for Sleep☆20Feb 20, 2026Updated 2 months ago
- Python tools for ethical hacking☆45Jul 14, 2019Updated 6 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- This contains common OSCP local exploits and enumeration scripts☆12Sep 18, 2015Updated 10 years ago
- A Burp Extension that makes it easier to view all script code on a Response.☆17Nov 12, 2023Updated 2 years ago
- minimalist sudo alternative: multi-user privilege escalation tool in three letters☆10Jul 5, 2022Updated 3 years ago
- Networking Tools for Calculations & Scans☆12Dec 11, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Powerful Rat/Botnet written C/C++ and Rust works on Windows, Linux and Mac OS, Android and IOT Devices Central / P2P Architecture. (Proje…☆11Apr 8, 2026Updated 3 weeks ago
- Enter Product Key Volatile Environment LPE☆13Jun 28, 2025Updated 10 months ago
- A window monitor bookmarklet.☆63Mar 7, 2018Updated 8 years ago
- A python script for easy static analysis and automatic signature generation of malware.☆12Sep 30, 2013Updated 12 years ago
- Escalation of privilege exploit for Dell BIOS flasher (Flash64W) (2017)☆13Dec 7, 2020Updated 5 years ago
- CVE-2023-28121 - WooCommerce Payments < 5.6.2 - Unauthenticated Privilege Escalation [ Mass Add Admin User ]☆12Jul 14, 2023Updated 2 years ago
- Linux and windows privilege escalation cheatsheet☆11May 18, 2023Updated 2 years ago