Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
-
Updated
May 6, 2024 - Python
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Dig Vulnerabilities in the BlackBox
An AI-powered Personal Identifiable Information (PII) scanner.
HTTP Request Smuggling Detection Tool
Query and report user logons relations from MS Windows Security Events
This tool can decrypt a BitLocker-locked partition with the TPM vulnerability
🏴☠️ tools (py3 version) of Black Hat Python book 🏴☠️
TPM vulnerability checking tool for CVE-2018-6622. This tool will be published at Black Hat Asia 2019 and Black Hat Europe 2019
<BLACKHAT> Generates CCN|{day}/{year}|{CVV} *** FOR EDUCATIONAL PURPOSES ONLY *** I AM NOT RESPONSIBLE FOR ANY MISUSE ***
[Fugitive was made to offer resourcfulness to 'Osint Investigations' Fugitive will allow you to collect detailed information about "subjects" and in further development will become one of the best OSINT tools for your personal or professional activities]
[@] This tool is written to increase website visits and in case of excessive use of it, the website will be blacklisted by Google.
python based sqli detector tool
This repository contains the python code of the keylogger which will get all the key hits by the user as well get the content from clipboard and appends them in the keylogs file
retrieve comprehensive information about a website, including its title, last modified date, DNS information, subdomains, firewall names, technologies used, and certificate information.
This repostiory contains the python code of command and control trojan which will be controlled from the GitHub repo which contains the configuration file where attacker can specify the task which trojan has to do in the victim machine and then upload the same content / file in the private gihub repository of the attacker.
The most powerful tool that creates a ddos attack on websites, it creates the attack in the form of missiles
Keylogger in python
DANGER! DO NOT USE IT! I WARN YOU BEFORE! This script monitors and intercepts Tor traffic to detect and handle malicious activity. It utilizes the Scapy and Stem libraries to analyze network packets and interact with the Tor network.
This repo explains the process of sandboxing with python as It is a computer security term reffering to when a program in set aside from other progams in a seprate environment so that if errors or security issues occur ,those issues will not spread to other areas on the computer .
Mac Changer In Python
Add a description, image, and links to the blackhat topic page so that developers can more easily learn about it.
To associate your repository with the blackhat topic, visit your repo's landing page and select "manage topics."