zedxpace / Trojan-in-Python
This repostiory contains the python code of command and control trojan which will be controlled from the GitHub repo which contains the configuration file where attacker can specify the task which trojan has to do in the victim machine and then upload the same content / file in the private gihub repository of the attacker.
☆13Updated 2 years ago
Alternatives and similar repositories for Trojan-in-Python:
Users that are interested in Trojan-in-Python are comparing it to the libraries listed below
- This repository contains the python code of the keylogger which will get all the key hits by the user as well get the content from clipbo…☆12Updated 2 years ago
- Information This tool is for educational purpose only, usage of TheFatRat for attacking targets without prior mutual consent is illegal. …☆13Updated 4 years ago
- XploitSPY is an Android Monitoring / Spying Tool☆23Updated 5 years ago
- Best Google Dorker Available☆35Updated 6 months ago
- FEBREV venom is a RAT generator tool to create Android RATs through metasploit , signs the RAT apk , and sends the RAT apk to the victim…☆16Updated 5 years ago
- Facebook Hacking Menu☆33Updated 5 years ago
- Advanced Android and System Hacking Tool . This tool used for some Cyber Attacks in System This Tool used for educational purpose and Thi…☆29Updated last week
- HTML WannaCry Ransomware v2.0 - websites defacement injection page☆25Updated 3 years ago
- Advanced payload generetor and multi handler☆38Updated 4 years ago
- Automatic XSS Vulnerability Scanner, Dorker, and Payload Injector☆22Updated 6 months ago
- program my own pegasus spyware using python☆27Updated 3 years ago
- <BLACKHAT> Generates CCN|{day}/{year}|{CVV} *** FOR EDUCATIONAL …☆26Updated last year
- sameer-k-dev / Ethical-Hacking-Hack-every-password-on-any-PC-with-USB-USB-Password-stealing-drive-USB-HacksEthical Hacking | Hack every password on any PC with USB | USB Password stealing drive | USB Hacks☆27Updated 4 years ago
- Wi-Fi Password Stealer☆55Updated 6 months ago
- BlueHunter is bluetooth device hacking framework☆21Updated last year
- python script that hide phishing url like a pro "masking url technique"☆40Updated 3 years ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆18Updated 2 years ago
- Automated Ip Tracking Tool☆27Updated 2 years ago
- H-SPLOIT-PAYLOAD GENERATE METASPLOIT PAYLOAD IN 1 CLICK☆31Updated 3 years ago
- Effortlessly Find Comprehensive Information on Individuals with Our dedsec People Search Tool!☆27Updated last week
- WhatsApp Hacking Learn about methods for ethical hacking of WhatsApp accounts. Facebook Hacking Explore techniques for ethical hacking o…☆42Updated 9 months ago
- USE THIS TOOL AGAINST SPAMMERS, THIS TOOL IS SO POWERFULL. ITS MAIN ABILITY IS CALL FLOODING.☆22Updated 4 years ago
- Track any ip address with IP-Tracer. IP-Tracer is developed for linux and android terminal like Termux and GNURoot Debian. you can retrie…☆25Updated 5 years ago
- ☆32Updated 11 months ago
- Android Exploit is an advanced version of rat/payload/botnet and can hack an android device in less than 1 minute and can control multipl…☆11Updated 2 years ago
- SARA - Simple Android Ransomware Attack☆10Updated 3 years ago
- "Kali replacer." It has a large number of hacking tools.☆39Updated 5 years ago
- SPAM ANDROID AS WELL AS IPHONE USERS WITH CALL FLOODING........☆17Updated 4 years ago
- A very user friendly and advanced phishing toolkit made for hackers☆29Updated 3 years ago
- A ransomware for Android!☆24Updated last year