This repostiory contains the python code of command and control trojan which will be controlled from the GitHub repo which contains the configuration file where attacker can specify the task which trojan has to do in the victim machine and then upload the same content / file in the private gihub repository of the attacker.
☆15Feb 17, 2023Updated 3 years ago
Alternatives and similar repositories for Trojan-in-Python
Users that are interested in Trojan-in-Python are comparing it to the libraries listed below
Sorting:
- This repository contains the python code of the keylogger which will get all the key hits by the user as well get the content from clipbo…☆12Feb 17, 2023Updated 3 years ago
- ⌨️ A keylogger is nothing more than a memorizer of actions produced on the keyboard: its translation from English is in fact “keylogger”.☆10Oct 24, 2022Updated 3 years ago
- This repository is based on the book "Black Hat Python" contains code and resources related to the tools and scripts discussed in the boo…☆15May 6, 2022Updated 3 years ago
- This is a python3 script for hacking Gmail account using Brute-force attack.☆16Nov 19, 2022Updated 3 years ago
- This repository is all about text files containing the way /steps to penetrate a system . it includes network pentesting ,web pentesting …☆15Feb 17, 2023Updated 3 years ago
- written to increase website visits and in case of excessive use of it, the website will be blacklisted by Google.☆23Jul 19, 2023Updated 2 years ago
- ⛔ "Sniffing" refers to monitoring Internet traffic in real time. Sniffers are programs or hardware devices that can spy on you and all yo…☆12Oct 24, 2022Updated 3 years ago
- privilege escalation by piggy-backing user sudo requests☆16Feb 6, 2023Updated 3 years ago
- Business automation solutions built with minimal, atomic components. Efficient. Reusable. Scalable. Open Source.☆10Aug 31, 2025Updated 6 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Jan 9, 2019Updated 7 years ago
- 《Python黑帽子-黑客与渗透测试编程之道》(Black Hat Python, 2nd Edition)阅读笔记☆51May 27, 2022Updated 3 years ago
- Official Black Hat Arsenal Security Tools Repository☆19Jan 1, 2018Updated 8 years ago
- aREST.js is a JavaScript library that was made to easily control your projects running aREST. It can be used with a simple web browser wi…☆23Sep 22, 2018Updated 7 years ago
- Dados Abertos do FiscalizaJá - Dados unificados e padronizados sobre uso do dinheiro público☆12Jan 3, 2025Updated last year
- Collection of white, grey and blackHat tools - for use playing around. setting up and operating pentesting linux builds - Primarily Kali-…☆22May 15, 2018Updated 7 years ago
- A fullstack E-Commerce Admin panel created with NextJS, React, TailwindCSS, Clerk, shadcn and Prisma.☆13Jul 31, 2023Updated 2 years ago
- ZephyrSDK (TMO_shell) is a Zephyr application built by T-Mobile and comes shipped on the DevEdge - IoT Developer Kit☆22May 3, 2024Updated last year
- Refactoring for 51pwn online☆13Dec 9, 2022Updated 3 years ago
- wifi dos attack tool☆57Nov 17, 2022Updated 3 years ago
- ☆16Jan 14, 2022Updated 4 years ago
- Mirror of https://gitea.osmocom.org/sim-card/osmo-sim-auth☆17Dec 19, 2022Updated 3 years ago
- HTTP based framework for building command and control components for remote access trojans☆15Aug 2, 2021Updated 4 years ago
- <BLACKHAT> Generates CCN|{day}/{year}|{CVV} *** FOR EDUCATIONAL …☆38Jun 25, 2023Updated 2 years ago
- it is a trojan at least, half of it is 💀 See Readme☆10Feb 26, 2021Updated 5 years ago
- sms sniffer and imsi catcher☆19Apr 9, 2021Updated 4 years ago
- ☆14Feb 26, 2024Updated 2 years ago
- Phishing webapp generator☆42Aug 17, 2018Updated 7 years ago
- Simple Automated Powershell Keylogger☆23May 21, 2020Updated 5 years ago
- Script to change kali repository mirror☆21Jun 2, 2019Updated 6 years ago
- Saudi IBAN validator☆18Dec 3, 2020Updated 5 years ago
- Remote Administration Tool☆10Mar 27, 2025Updated 11 months ago
- A Simple Python 3 Reverse Shell Script☆11Dec 24, 2018Updated 7 years ago
- BUG HUNTING/WEB APPLICATION PENTESTING CHECKLIST☆15May 30, 2023Updated 2 years ago
- SpyDork is a python dork generator.☆14Aug 1, 2022Updated 3 years ago
- Python RAT with reverse connection and asymmetric encrypted communications☆16Jun 30, 2020Updated 5 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆15Sep 13, 2017Updated 8 years ago
- (EDUCATIONAL PURPOSES ONLY) bypass discord blacklisted words.☆10Apr 27, 2023Updated 2 years ago
- Build an Exercise Tracking App: Geolocation & Tracking☆24Jul 29, 2012Updated 13 years ago
- A Full Transcript and Slides from the talk "Attacks on Anonymity Systems: The Theory" by Len Sassaman and Roger Dingledine in 2003☆16Feb 28, 2024Updated 2 years ago