mrinalwahal / ObfuscatorLinks
Python Script Obfuscator
☆10Updated 10 years ago
Alternatives and similar repositories for Obfuscator
Users that are interested in Obfuscator are comparing it to the libraries listed below
Sorting:
- Universal MITM web server☆108Updated 8 years ago
- Entropic Password Manager Generator is a cross-platform, most secure and storageless password manager that generates passwords☆22Updated 4 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆37Updated 7 years ago
- A Cross-Platform Forensic Framework for Google Chrome☆70Updated 10 years ago
- Automatic backdooring apk with meterpreter (PoC)☆51Updated 8 years ago
- Scan/Exploit Blueborne CVE-2017-0785☆29Updated 7 years ago
- A python based https remote access trojan for penetration testing☆84Updated 9 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 10 years ago
- Visual Basic GUI: A Tool to Inject Keystrokes on a SSH Client via an X11 Forwarded Session☆63Updated 7 years ago
- Removed according to regulations☆35Updated 8 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆57Updated 10 years ago
- ssh management tool to provides commandline access to a remote system running SSH server☆75Updated 7 years ago
- Python script based on aireplay-ng to keep deauthenticating the specified stations from your WiFi network.☆49Updated 9 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 8 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- SSH Based Remote Administration Tool☆104Updated 10 years ago
- Clone of hidden tear written in C++☆70Updated 4 years ago
- A multi service threaded MD5 cracker☆66Updated 9 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆73Updated 5 years ago
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 9 years ago
- simple reverse tcp backdoor hack☆63Updated 4 years ago
- Docker container to run PoisonTap☆15Updated 8 years ago
- IPv6 address spoofing with the Neighbor Discovery Protocol☆53Updated 7 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago
- Linux backdoor implementation written in Python☆58Updated 10 years ago
- Script to generate malicious debian packages (debain trojans).☆119Updated 6 years ago
- DNS rebinding is powerful: how to steal WiFi passwords by just tricking a victim into visiting a website, thanks to that fancy Bang & Olu…☆81Updated 6 years ago
- A reverse ssh shell written in python, intended for penetration testers to use as a covert channel on windows☆87Updated 9 years ago
- Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638)☆43Updated 4 years ago