This repostiory contains the python code of command and control trojan which will be controlled from the GitHub repo which contains the configuration file where attacker can specify the task which trojan has to do in the victim machine and then upload the same content / file in the private gihub repository of the attacker.
☆15Feb 17, 2023Updated 3 years ago
Alternatives and similar repositories for Trojan-in-Python
Users that are interested in Trojan-in-Python are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository contains the python code of the keylogger which will get all the key hits by the user as well get the content from clipbo…☆12Feb 17, 2023Updated 3 years ago
- ⌨️ A keylogger is nothing more than a memorizer of actions produced on the keyboard: its translation from English is in fact “keylogger”.☆11Oct 24, 2022Updated 3 years ago
- This repository is based on the book "Black Hat Python" contains code and resources related to the tools and scripts discussed in the boo…☆15May 6, 2022Updated 4 years ago
- Man in the browser attack is all about stealing credentials from sites running in internet-explorer by forcing user to logout and then ag…☆11Feb 17, 2023Updated 3 years ago
- This is a python3 script for hacking Gmail account using Brute-force attack.☆17Nov 19, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- This repository is all about text files containing the way /steps to penetrate a system . it includes network pentesting ,web pentesting …☆15Feb 17, 2023Updated 3 years ago
- written to increase website visits and in case of excessive use of it, the website will be blacklisted by Google.☆22Jul 19, 2023Updated 2 years ago
- ⛔ "Sniffing" refers to monitoring Internet traffic in real time. Sniffers are programs or hardware devices that can spy on you and all yo…☆13Oct 24, 2022Updated 3 years ago
- privilege escalation by piggy-backing user sudo requests☆16Feb 6, 2023Updated 3 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆15Jan 9, 2019Updated 7 years ago
- 《Python黑帽子-黑客与渗透测试编程之道》(Black Hat Python, 2nd Edition)阅读笔记☆49May 27, 2022Updated 3 years ago
- Official Black Hat Arsenal Security Tools Repository☆19Jan 1, 2018Updated 8 years ago
- EFI Hackintosh AMD Ryzen 3 2200G☆10Aug 26, 2024Updated last year
- Stealer chrome v81+, Firefox v75+, And more than 30 different programs and crypto-wallets☆11May 1, 2020Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Collection of white, grey and blackHat tools - for use playing around. setting up and operating pentesting linux builds - Primarily Kali-…☆24May 15, 2018Updated 8 years ago
- A fullstack E-Commerce Admin panel created with NextJS, React, TailwindCSS, Clerk, shadcn and Prisma.☆13Jul 31, 2023Updated 2 years ago
- ZephyrSDK (TMO_shell) is a Zephyr application built by T-Mobile and comes shipped on the DevEdge - IoT Developer Kit☆22May 3, 2024Updated 2 years ago
- Internet Explorer Organization Page☆23Oct 31, 2018Updated 7 years ago
- This repositories has all the best out of Bests RATs the world has ever seen 😨 😈☆17May 23, 2020Updated 5 years ago
- 1000 black hat tools Collected From github☆82Dec 12, 2023Updated 2 years ago
- The big-tool is for installing all hacking and security tools !☆10Jul 4, 2021Updated 4 years ago
- wifi dos attack tool☆62Nov 17, 2022Updated 3 years ago
- ☆17Jan 14, 2022Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- HTTP based framework for building command and control components for remote access trojans☆15Aug 2, 2021Updated 4 years ago
- <BLACKHAT> Generates CCN|{day}/{year}|{CVV} *** FOR EDUCATIONAL …☆38Jun 25, 2023Updated 2 years ago
- ☆14Feb 26, 2024Updated 2 years ago
- this project is a smart sniffer made by BlackDOS team☆11Jun 14, 2017Updated 8 years ago
- GUI project for steghide☆18Aug 28, 2018Updated 7 years ago
- ☆13Sep 7, 2023Updated 2 years ago
- BUG HUNTING/WEB APPLICATION PENTESTING CHECKLIST☆15May 30, 2023Updated 2 years ago
- (EDUCATIONAL PURPOSES ONLY) bypass discord blacklisted words.☆10Apr 27, 2023Updated 3 years ago
- It is a project produced to expose the main logic of OSINT-AI tools offered for sale on the DarkWeb☆37Apr 12, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A quick-and-easy bash script installing and launching EvilGinx2, a phishing reverse-proxy☆29Apr 1, 2026Updated last month
- 🌑Dark Mode Texture Pack for Minecraft: Java Edition and Mods☑️☆16Feb 6, 2024Updated 2 years ago
- Quixotic Color Scheme for Papirus Icons☆19Aug 16, 2022Updated 3 years ago
- Tor command line tools for Mac☆12Jan 20, 2016Updated 10 years ago
- Persian-CreditCardForm is a forked iOS framework that allows developers to create the UI which replicates an actual Credit Card.☆10Dec 5, 2018Updated 7 years ago
- decompiled pegasus_spyware☆46Jul 28, 2021Updated 4 years ago
- Global Satellite Assessment Tool (GlobalSAT)☆21Feb 1, 2026Updated 3 months ago