malwarekid / Pyfuscator
Pyfuscator is a Python tool designed to obfuscate Python scripts by encoding and encrypting them. It allows you to transform your Python code into an obfuscated form, which can help in hiding the logic of the script and potentially evade basic static analysis.
☆23Updated 9 months ago
Alternatives and similar repositories for Pyfuscator
Users that are interested in Pyfuscator are comparing it to the libraries listed below
Sorting:
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated 11 months ago
- A script to automate keystrokes through a graphical desktop program.☆35Updated 3 months ago
- LNK-Dropper Builder☆22Updated last month
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- Android devices using ADB via the Shodan API. It prompts the user for a command payload, then establishes TCP connections to devices with…☆10Updated 2 months ago
- Generate FUD Droppers that are undetectable by popular AV's☆31Updated last year
- Social Engineering Browser Update Attack.☆57Updated last year
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆18Updated last year
- Ded Security Framework is a tool aimed at security professionals☆35Updated last year
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆34Updated 10 months ago
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆25Updated 2 years ago
- Tool to parse Stealer Logs.☆17Updated last year
- Single-Clich-Proxy-Chains☆9Updated 4 years ago
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆34Updated 2 months ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆39Updated 2 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆63Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆18Updated 2 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆35Updated last year
- web based c2 🏴☠️☆13Updated 9 months ago
- Simple Tool for webhacking☆11Updated 2 years ago
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- A simple and efficent script to obfuscate python payloads to make it completely FUD☆36Updated last year
- Pentesting Tools to Automatize Active Directory Hacking☆20Updated 2 years ago
- BreachCheck is a tool designed to help users search for their passwords in known data breaches and leaks.☆22Updated 9 months ago
- Python program Fileless-PE.py generates a Python script (PEloader.py) to load a DLL or EXE file from a given URL. It provides functionali…☆23Updated 9 months ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆16Updated 9 months ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆43Updated 2 weeks ago
- Hacking with PasteJacking technique☆22Updated 10 months ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆29Updated 2 weeks ago
- VLAN attacks toolkit☆14Updated 2 years ago