zedxpace / Trojan-in-PythonLinks
This repostiory contains the python code of command and control trojan which will be controlled from the GitHub repo which contains the configuration file where attacker can specify the task which trojan has to do in the victim machine and then upload the same content / file in the private gihub repository of the attacker.
☆14Updated 2 years ago
Alternatives and similar repositories for Trojan-in-Python
Users that are interested in Trojan-in-Python are comparing it to the libraries listed below
Sorting:
- This repository contains the python code of the keylogger which will get all the key hits by the user as well get the content from clipbo…☆12Updated 2 years ago
- Wi-Fi Password Stealer☆64Updated last year
- This ia an Offensive Bruteforce Attack Tool, Just For Educational Purpose Only☆44Updated 3 weeks ago
- BlueHunter is bluetooth device hacking framework☆24Updated 2 years ago
- WhatsApp Hacking Learn about methods for ethical hacking of WhatsApp accounts. Facebook Hacking Explore techniques for ethical hacking o…☆98Updated 2 weeks ago
- 888 RAT Pro Options : File Manager Remote Desktop Web cam capture Sound capture Get password (all last browser 2 met…☆87Updated 2 years ago
- Website Information Gathering Tool☆94Updated 8 months ago
- Z-Ransom (Create Android Ransomware In Kali linux and Termux (NO ROOT)☆88Updated 3 years ago
- Facebook Brute Force Version 1.0☆54Updated 2 years ago
- GUI based tool to track location and more info of mobile numbers☆81Updated 2 years ago
- PHP email spoofer | Send emails from any email adress☆83Updated 5 years ago
- Information This tool is for educational purpose only, usage of TheFatRat for attacking targets without prior mutual consent is illegal. …☆16Updated 5 years ago
- Advanced payload generetor and multi handler☆37Updated 5 years ago
- Bark Toolkit is a toolkit wich provides Denial-of-service attacks, SMS attacks and more.☆53Updated 4 years ago
- Bug Hunting Penetration RGB Hat are red, gray, and black hat☆19Updated 2 weeks ago
- Meterpreter payload for all platforms☆74Updated 4 years ago
- Includes Spoof kit, Phishing Tool Kit, Credit Card Scanner, IP Sniffer, KeyLoggers, Tabnabbing, RansomWare, Viruses, RATS And More . . .☆47Updated 7 years ago
- This is a guide for Penetration Testers how to use Penetration Testing tools and their advanced used. Need everyone's help to make it bat…☆50Updated 4 years ago
- Online hacking☆57Updated 2 weeks ago
- Python script to automatically steal all the files and information from a computer using an USB device. Created just for educational purp…☆55Updated 3 weeks ago
- A small script to find the exact Geo-location of IP☆38Updated 3 years ago
- HTML WannaCry Ransomware v2.0 - websites defacement injection page☆31Updated 4 years ago
- CCTV & Webcam Hacking☆159Updated 8 months ago
- The tool generates a malicious HTTPS page using Ngrok Port Forwarding method, and a javascript code to perform cam requests using MediaDe…☆29Updated 5 years ago
- Facebook Hacking Menu☆39Updated 5 years ago
- LoVerst is a backdoor generator and backdoor generating tools.☆73Updated 3 years ago
- This tool named "CallSpoof" is mainly used to prank with friends , All working apis are present in the script , If you do any illegal act…☆58Updated last year
- A voice control hacking assistant in Python☆186Updated 6 years ago
- A Tool For Absolute Beginners On Kali Linux. An Interactive Script That'll Guide You Through Attacks.☆70Updated 3 years ago
- Gmail-Brute Force Tool ;)☆52Updated 2 years ago