malwarekid / PyfuscatorLinks
Pyfuscator is a Python tool designed to obfuscate Python scripts by encoding and encrypting them. It allows you to transform your Python code into an obfuscated form, which can help in hiding the logic of the script and potentially evade basic static analysis.
☆28Updated 11 months ago
Alternatives and similar repositories for Pyfuscator
Users that are interested in Pyfuscator are comparing it to the libraries listed below
Sorting:
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆25Updated 2 years ago
- A PowerShell script that simplifies life and therefore... phishing.☆19Updated 2 years ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- Generate Undetectable Metasploit Payload in a simple way☆39Updated last year
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆70Updated 11 months ago
- Pentesting Tools to Automatize Active Directory Hacking☆22Updated 2 years ago
- A simple and efficent script to obfuscate python payloads to make it completely FUD☆36Updated last year
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆20Updated 2 years ago
- Tool to parse Stealer Logs.☆17Updated last year
- Generate FUD Droppers that are undetectable by popular AV's☆30Updated last year
- A simple script to obfuscate batch(bat) code easily☆24Updated last year
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆25Updated 3 months ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆136Updated 3 years ago
- Python3 script to dump breach data from Dehashed☆32Updated 3 weeks ago
- Android devices using ADB via the Shodan API. It prompts the user for a command payload, then establishes TCP connections to devices with…☆12Updated 4 months ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆42Updated 2 years ago
- Post-Exploitation Tool to Steal MySQL Data, and with persistence extract all data from MySQL table every time that Windows are opened wit…☆12Updated 2 years ago
- PrivacyNet: Privacy Network☆49Updated 10 months ago
- Windows Hacking FrameWork using Reverse Shell☆107Updated 4 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆18Updated 2 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated last year
- Python program Fileless-PE.py generates a Python script (PEloader.py) to load a DLL or EXE file from a given URL. It provides functionali…☆25Updated last year
- Social Engineering Browser Update Attack.☆56Updated last year
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability ass…☆39Updated 2 weeks ago
- This tool generates an undetectable Windows reverse shell PowerShell script. Users can configure IP and Port according to their requireme…☆13Updated last year
- A script to automate keystrokes through a graphical desktop program.☆35Updated last month
- web based c2 🏴☠️☆14Updated 11 months ago
- Clipboard poisoning attack.☆58Updated 5 years ago
- Malware Libraries focused in help Malware Development☆23Updated 2 years ago
- Hacking with PasteJacking technique☆22Updated last year