This repostiory contains the python code of command and control trojan which will be controlled from the GitHub repo which contains the configuration file where attacker can specify the task which trojan has to do in the victim machine and then upload the same content / file in the private gihub repository of the attacker.
☆14Feb 17, 2023Updated 3 years ago
Alternatives and similar repositories for Trojan-in-Python
Users that are interested in Trojan-in-Python are comparing it to the libraries listed below
Sorting:
- This repository contains the python code of the keylogger which will get all the key hits by the user as well get the content from clipbo…☆12Feb 17, 2023Updated 3 years ago
- ⌨️ A keylogger is nothing more than a memorizer of actions produced on the keyboard: its translation from English is in fact “keylogger”.☆10Oct 24, 2022Updated 3 years ago
- This repository is based on the book "Black Hat Python" contains code and resources related to the tools and scripts discussed in the boo…☆14May 6, 2022Updated 3 years ago
- This is a python3 script for hacking Gmail account using Brute-force attack.☆15Nov 19, 2022Updated 3 years ago
- ⛔ "Sniffing" refers to monitoring Internet traffic in real time. Sniffers are programs or hardware devices that can spy on you and all yo…☆12Oct 24, 2022Updated 3 years ago
- written to increase website visits and in case of excessive use of it, the website will be blacklisted by Google.☆23Jul 19, 2023Updated 2 years ago
- <BLACKHAT> Generates CCN|{day}/{year}|{CVV} *** FOR EDUCATIONAL …☆37Jun 25, 2023Updated 2 years ago
- OTP-BYPASS-2022 Signaling System is an international telecommunication protocol standard that defines how the network elements in a publi…☆12Oct 10, 2022Updated 3 years ago
- Custom Python 2.7 RAT☆10May 25, 2016Updated 9 years ago
- it is a trojan at least, half of it is 💀 See Readme☆10Feb 26, 2021Updated 5 years ago
- This repository contains sEMG Data of 13 subjects recorded with the Myo Armband.☆13Jan 8, 2022Updated 4 years ago
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆11May 19, 2020Updated 5 years ago
- Ducky Script is the payload language of Hak5 gear. Since its introduction with the USB Rubber Ducky in 2010, Ducky Script has grown in ca…☆12Jun 20, 2024Updated last year
- ☆13Feb 16, 2022Updated 4 years ago
- Lecture topics for the Israeli Node.js community monthly meetups☆12May 30, 2018Updated 7 years ago
- Source code to the static website at stockstream.live☆12Feb 28, 2018Updated 8 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Jan 9, 2019Updated 7 years ago
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 5 years ago
- A bird's eye view of Digital Projects at the City of Austin☆11Apr 5, 2020Updated 5 years ago
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Jun 12, 2019Updated 6 years ago
- Store sensible data in a simple and secure way☆10Jun 18, 2017Updated 8 years ago
- Download any icon pack from IconArchive, even ones that you can't download.☆12Jul 23, 2020Updated 5 years ago
- Persian-CreditCardForm is a forked iOS framework that allows developers to create the UI which replicates an actual Credit Card.☆10Dec 5, 2018Updated 7 years ago
- ☆10May 15, 2023Updated 2 years ago
- Bunnymark for Godot Engine☆10Jan 28, 2015Updated 11 years ago
- The standard ADB Configuration involves a USB Connection to a physical Device. If you prefer, you can switch over to TCP/IP Mode and conn…☆19Nov 4, 2023Updated 2 years ago
- 小码哥底层原理班视频笔记与代码☆10Jul 10, 2018Updated 7 years ago
- Live sass compiler for acode☆12Jul 12, 2023Updated 2 years ago
- zygotebench - benchmark process creation speed on Android☆13Dec 4, 2013Updated 12 years ago
- Yet another open source template☆11Jul 12, 2021Updated 4 years ago
- A fullstack E-Commerce Admin panel created with NextJS, React, TailwindCSS, Clerk, shadcn and Prisma.☆13Jul 31, 2023Updated 2 years ago
- 《Python黑帽子-黑客与渗透测试编程之道》(Black Hat Python, 2nd Edition)阅读笔记☆51May 27, 2022Updated 3 years ago
- Links Panel, collecting all the links on a page☆16Jun 19, 2025Updated 8 months ago
- ☆15Jan 14, 2022Updated 4 years ago
- Transform android.jar files to a custom JDK image which can be used in AndroidIDE to provide java completions and actions.☆12Jul 16, 2022Updated 3 years ago
- sms sniffer and imsi catcher☆18Apr 9, 2021Updated 4 years ago
- The big-tool is for installing all hacking and security tools !☆10Jul 4, 2021Updated 4 years ago
- Man in the browser attack is all about stealing credentials from sites running in internet-explorer by forcing user to logout and then ag…☆10Feb 17, 2023Updated 3 years ago
- This repository is a place to leave and share notes on Hak5 scripts - credit to the many authors for sharing great content.☆13Nov 27, 2021Updated 4 years ago