This repostiory contains the python code of command and control trojan which will be controlled from the GitHub repo which contains the configuration file where attacker can specify the task which trojan has to do in the victim machine and then upload the same content / file in the private gihub repository of the attacker.
☆15Feb 17, 2023Updated 3 years ago
Alternatives and similar repositories for Trojan-in-Python
Users that are interested in Trojan-in-Python are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository contains the python code of the keylogger which will get all the key hits by the user as well get the content from clipbo…☆12Feb 17, 2023Updated 3 years ago
- ⌨️ A keylogger is nothing more than a memorizer of actions produced on the keyboard: its translation from English is in fact “keylogger”.☆10Oct 24, 2022Updated 3 years ago
- This repository is based on the book "Black Hat Python" contains code and resources related to the tools and scripts discussed in the boo…☆15May 6, 2022Updated 3 years ago
- Python Remote Access Tool☆25Feb 21, 2020Updated 6 years ago
- Man in the browser attack is all about stealing credentials from sites running in internet-explorer by forcing user to logout and then ag…☆11Feb 17, 2023Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This is a python3 script for hacking Gmail account using Brute-force attack.☆17Nov 19, 2022Updated 3 years ago
- This repository is all about text files containing the way /steps to penetrate a system . it includes network pentesting ,web pentesting …☆15Feb 17, 2023Updated 3 years ago
- ⛔ "Sniffing" refers to monitoring Internet traffic in real time. Sniffers are programs or hardware devices that can spy on you and all yo…☆12Oct 24, 2022Updated 3 years ago
- python based sqli detector tool☆15Jan 10, 2023Updated 3 years ago
- Business automation solutions built with minimal, atomic components. Efficient. Reusable. Scalable. Open Source.☆10Aug 31, 2025Updated 7 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆15Jan 9, 2019Updated 7 years ago
- Official Black Hat Arsenal Security Tools Repository☆19Jan 1, 2018Updated 8 years ago
- aREST.js is a JavaScript library that was made to easily control your projects running aREST. It can be used with a simple web browser wi…☆23Sep 22, 2018Updated 7 years ago
- This was a weekend hack to find bitcoin addresses with a weak private key (or to be exact generated via weak seeds). Also see BlackHat ta…☆16Aug 4, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Dados Abertos do FiscalizaJá - Dados unificados e padronizados sobre uso do dinheiro público☆12Jan 3, 2025Updated last year
- OTP-BYPASS-2022 Signaling System is an international telecommunication protocol standard that defines how the network elements in a publi…☆12Oct 10, 2022Updated 3 years ago
- A fullstack E-Commerce Admin panel created with NextJS, React, TailwindCSS, Clerk, shadcn and Prisma.☆13Jul 31, 2023Updated 2 years ago
- ZephyrSDK (TMO_shell) is a Zephyr application built by T-Mobile and comes shipped on the DevEdge - IoT Developer Kit☆22May 3, 2024Updated last year
- Internet Explorer Organization Page☆23Oct 31, 2018Updated 7 years ago
- Community radio software suite using Icecast, Flask and React.☆13Jan 6, 2023Updated 3 years ago
- Refactoring for 51pwn online☆13Dec 9, 2022Updated 3 years ago
- 1000 black hat tools Collected From github☆82Dec 12, 2023Updated 2 years ago
- wifi dos attack tool☆62Nov 17, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- The big-tool is for installing all hacking and security tools !☆10Jul 4, 2021Updated 4 years ago
- ☆17Jan 14, 2022Updated 4 years ago
- <BLACKHAT> Generates CCN|{day}/{year}|{CVV} *** FOR EDUCATIONAL …☆36Jun 25, 2023Updated 2 years ago
- it is a trojan at least, half of it is 💀 See Readme☆10Feb 26, 2021Updated 5 years ago
- ☆14Feb 26, 2024Updated 2 years ago
- Contact Telegram : https://t.me/hakanonymos☆57May 17, 2024Updated last year
- this project is a smart sniffer made by BlackDOS team☆11Jun 14, 2017Updated 8 years ago
- ☆13Sep 7, 2023Updated 2 years ago
- A Simple Python 3 Reverse Shell Script☆11Dec 24, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- SpyDork is a python dork generator.☆14Aug 1, 2022Updated 3 years ago
- BUG HUNTING/WEB APPLICATION PENTESTING CHECKLIST☆15May 30, 2023Updated 2 years ago
- Python RAT with reverse connection and asymmetric encrypted communications☆14Jun 30, 2020Updated 5 years ago
- Some online tools for developers☆21Dec 25, 2025Updated 4 months ago
- Evilip Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. E…☆29Feb 4, 2023Updated 3 years ago
- (EDUCATIONAL PURPOSES ONLY) bypass discord blacklisted words.☆10Apr 27, 2023Updated 3 years ago
- Build an Exercise Tracking App: Geolocation & Tracking☆24Jul 29, 2012Updated 13 years ago