rhoskal / crispy-fortnight
Custom Python 2.7 RAT
☆11Updated 8 years ago
Alternatives and similar repositories for crispy-fortnight:
Users that are interested in crispy-fortnight are comparing it to the libraries listed below
- This is a cross-platform Python 2.x Remote Access Trojan (RAT)☆15Updated 7 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago
- Keylogger using FTP server as an intermediate with some cool additional functions☆22Updated 7 years ago
- Kill Any Antivirus Using Python For Windows Users .☆45Updated 8 years ago
- Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.☆21Updated 8 years ago
- A simple Android Remote Administration Tool written for https://0x00sec.org!☆34Updated 8 years ago
- A pure python, post-exploitation, remote administration tool (RAT) for macOS / OS X.☆47Updated 7 years ago
- CryptoTrojan in Python (For educational purpose ONLY)☆47Updated 6 years ago
- Better Remote Access Trojan☆48Updated 8 years ago
- Simple security surveillance script for linux distributions.☆58Updated 8 years ago
- Capstone: Keylogger Trojan☆35Updated 6 years ago
- HTTP BOTNET☆8Updated last year
- pinky - The PHP mini RAT (Remote Administration Tool)☆72Updated 6 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆28Updated 9 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆49Updated 7 years ago
- Mass malicious script dump/Malware src dump☆56Updated 8 years ago
- Python backdoor that uses http post/get requests to communicate☆40Updated 8 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆22Updated 6 years ago
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆32Updated 8 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Updated 9 years ago
- Samsung TV Denial of Service (DoS) Attack☆36Updated 8 years ago
- Example crypter is a project demonstrating how files can be encrypted and injected into memory using a stub file.☆17Updated 8 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆26Updated 7 years ago
- iSpy Keylogger☆42Updated 8 years ago
- This is a R.A.T Client for android phones☆27Updated 7 years ago
- ☆24Updated 9 years ago
- Python - Human Interface Device Android Attack Framework☆36Updated 7 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆25Updated 7 years ago
- Download and Inject code into Google Chrome extensions☆13Updated 7 years ago
- Random stuff☆16Updated 6 years ago