malwares / pupyLinks
Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android) Remote Administration Tool with an embedded Python interpreter.
☆15Updated 9 years ago
Alternatives and similar repositories for pupy
Users that are interested in pupy are comparing it to the libraries listed below
Sorting:
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Updated 9 years ago
- Brand New Code Injection for Windows☆12Updated 8 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆34Updated 8 years ago
- Miscellaneous exploit code☆20Updated 8 years ago
- Archive of leaked Equation Group materials☆15Updated 8 years ago
- Malicious Software SRC Extract☆31Updated 2 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Updated 8 years ago
- Framework for Making Environmental Keyed Payloads☆13Updated 8 years ago
- SQLi Tool/SQL Injection/Hijacker☆45Updated 8 years ago
- Leaked Mirai Source Code for Research/IoC Development Purposes☆16Updated 8 years ago
- Exploitkit☆185Updated 8 years ago
- Experimental examples of Ransomware in different languages☆37Updated 7 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆36Updated 9 years ago
- A Python program that scans RAM.☆39Updated 10 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆50Updated 6 years ago
- Mutation Of Vıruses☆49Updated 9 years ago
- Simple Remote Access Trojan☆23Updated 8 years ago
- malwares src dump☆42Updated 8 years ago
- Better Remote Access Trojan☆50Updated 8 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 8 years ago
- Remote Windows shell☆32Updated 11 years ago
- some python3 functions to add spreading features to any python backdoor☆54Updated 8 years ago
- PoC Android smart phone botnet☆78Updated 13 years ago
- Samsung TV Denial of Service (DoS) Attack☆37Updated 8 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆28Updated 4 years ago
- Graphical user interface for the windows version of THC Hydra☆53Updated 7 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆59Updated 2 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆75Updated 8 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆26Updated 8 years ago