All Projects → Pyiris Backdoor → Similar Projects or Alternatives

1042 Open source projects that are alternatives of or similar to Pyiris Backdoor

Technowlogger
TechNowLogger is Windows/Linux Keylogger Generator which sends key-logs via email with other juicy target info
Stars: ✭ 172 (+18.62%)
Mutual labels:  kali-linux, keylogger
conti-pentester-guide-leak
Leaked pentesting manuals given to Conti ransomware crooks
Stars: ✭ 772 (+432.41%)
Mutual labels:  cybersecurity, infosec
phisherprice
All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.
Stars: ✭ 38 (-73.79%)
Mutual labels:  cybersecurity, infosec
Urlcrazy
Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.
Stars: ✭ 150 (+3.45%)
Mutual labels:  kali-linux, infosec
Checkmyhttps
We propose a user-friendly add-on that allows you to check if your encrypted web traffic (SSL/TLS) towards secured Internet servers (HTTPS) is not intercepted (being listened to).
Stars: ✭ 35 (-75.86%)
Mutual labels:  infosec, cybersecurity
Lyricpass
Password wordlist generator using song lyrics for targeted bruteforce audits / attacks. Useful for penetration testing or security research.
Stars: ✭ 58 (-60%)
Mutual labels:  kali-linux, infosec
Analyst Arsenal
A toolkit for Security Researchers
Stars: ✭ 112 (-22.76%)
Mutual labels:  infosec, cybersecurity
DcRat
A simple remote tool in C#.
Stars: ✭ 709 (+388.97%)
Mutual labels:  backdoor, infosec
NIST-to-Tech
An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (-57.93%)
Mutual labels:  cybersecurity, infosec
urlRecon
📝 urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Server Fingerprint * IP geolocation of the server
Stars: ✭ 31 (-78.62%)
Mutual labels:  cybersecurity, reconnaissance
Ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Stars: ✭ 1,934 (+1233.79%)
Mutual labels:  backdoor, kali-linux
Malware-Sample-Sources
Malware Sample Sources
Stars: ✭ 214 (+47.59%)
Mutual labels:  cybersecurity, infosec
RSB-Framework
Windows/Linux - ReverseShellBackdoor Framework
Stars: ✭ 44 (-69.66%)
Mutual labels:  backdoor, trojan
Jasmin-Ransomware
Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (-42.07%)
Mutual labels:  cybersecurity, kali-linux
go-spyse
The official wrapper for spyse.com API, written in Go, aimed to help developers build their integrations with Spyse.
Stars: ✭ 25 (-82.76%)
Mutual labels:  cybersecurity, reconnaissance
adalanche
Active Directory ACL Visualizer and Explorer - who's really Domain Admin?
Stars: ✭ 862 (+494.48%)
Mutual labels:  infosec, reconnaissance
Backdoor
A backdoor that runs on Linux and Windows
Stars: ✭ 36 (-75.17%)
Mutual labels:  backdoor, trojan
AttackSurfaceManagement
Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (-68.97%)
Mutual labels:  cybersecurity, reconnaissance
Argos
This script will automatically set up an OSINT workstation starting from a Ubuntu OS.
Stars: ✭ 73 (-49.66%)
Mutual labels:  infosec, reconnaissance
AutonomousThreatSweep
Threat Hunting queries for various attacks
Stars: ✭ 70 (-51.72%)
Mutual labels:  cybersecurity, infosec
rawsec-cybersecurity-inventory
An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.
Stars: ✭ 153 (+5.52%)
Mutual labels:  cybersecurity, infosec
trj
Execute any command in other's computer using a trojan horse coded and compiled in C. Just for educational purpose.
Stars: ✭ 21 (-85.52%)
Mutual labels:  trojan, cybersecurity
Malware Feed
Bringing you the best of the worst files on the Internet.
Stars: ✭ 69 (-52.41%)
Mutual labels:  infosec, cybersecurity
phomber
Phomber is infomation grathering tool that reverse search phone numbers and get their details, written in python3.
Stars: ✭ 59 (-59.31%)
Mutual labels:  cybersecurity, reconnaissance
k8s-nuclei-templates
Nuclei templates for K8S security scanning
Stars: ✭ 85 (-41.38%)
Mutual labels:  infosec, reconnaissance
dorothy
Dorothy is a tool to test security monitoring and detection for Okta environments
Stars: ✭ 85 (-41.38%)
Mutual labels:  cybersecurity, infosec
pyc2bytecode
A Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Stars: ✭ 70 (-51.72%)
Mutual labels:  cybersecurity, infosec
Networm
Python network worm that spreads on the local network and gives the attacker control of these machines.
Stars: ✭ 135 (-6.9%)
Mutual labels:  trojan, backdoor
Docker Security Images
🔐 Docker Container for Penetration Testing & Security
Stars: ✭ 172 (+18.62%)
Mutual labels:  infosec, cybersecurity
Megplus
Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED]
Stars: ✭ 268 (+84.83%)
Mutual labels:  infosec, reconnaissance
Remot3d
Remot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors
Stars: ✭ 263 (+81.38%)
Mutual labels:  trojan, backdoor
Wifipassword Stealer
Get All Registered Wifi Passwords from Target Computer.
Stars: ✭ 97 (-33.1%)
Mutual labels:  cybersecurity, keylogger
Open-source-tools-for-CTI
Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
Stars: ✭ 91 (-37.24%)
Mutual labels:  cybersecurity, infosec
Natlas
Scaling Network Scanning. Changes prior to 1.0 may cause difficult to avoid backwards incompatibilities. You've been warned.
Stars: ✭ 333 (+129.66%)
Mutual labels:  infosec, reconnaissance
Stupidkeylogger
A Terrific Keystroke Recorder
Stars: ✭ 318 (+119.31%)
Mutual labels:  trojan, keylogger
Webmap
WebMap-Nmap Web Dashboard and Reporting
Stars: ✭ 357 (+146.21%)
Mutual labels:  infosec, cybersecurity
KeyPlexer
Capstone: Keylogger Trojan
Stars: ✭ 32 (-77.93%)
Mutual labels:  trojan, keylogger
Logkeys
📝 ⌨️ A GNU/Linux keylogger that works!
Stars: ✭ 518 (+257.24%)
Mutual labels:  cybersecurity, keylogger
Search That Hash
🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡
Stars: ✭ 466 (+221.38%)
Mutual labels:  infosec, cybersecurity
Bigbountyrecon
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Stars: ✭ 541 (+273.1%)
Mutual labels:  cybersecurity, reconnaissance
Trojancockroach
A Stealthy Trojan Spyware
Stars: ✭ 424 (+192.41%)
Mutual labels:  trojan, keylogger
Awesome Security Hardening
A collection of awesome security hardening guides, tools and other resources
Stars: ✭ 630 (+334.48%)
Mutual labels:  infosec, cybersecurity
Keylogger
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Stars: ✭ 604 (+316.55%)
Mutual labels:  cybersecurity, keylogger
wifi-deauther
A fully automatic wifi deauther coded in Python
Stars: ✭ 25 (-82.76%)
Mutual labels:  cybersecurity, kali-linux
Dr0p1t Framework
A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+680.69%)
Mutual labels:  kali-linux, backdoor
Certeagle
Weaponizing Live CT logs for automated monitoring of assets
Stars: ✭ 78 (-46.21%)
Mutual labels:  cybersecurity, reconnaissance
Awesome Nodejs Security
Awesome Node.js Security resources
Stars: ✭ 1,294 (+792.41%)
Mutual labels:  infosec, cybersecurity
Vuldash
Vulnerability Dashboard
Stars: ✭ 16 (-88.97%)
Mutual labels:  infosec, cybersecurity
Ge.mine.nu
Code from my old page ge.mine.nu
Stars: ✭ 31 (-78.62%)
Mutual labels:  kali-linux, reconnaissance
Rapidscan
🆕 The Multi-Tool Web Vulnerability Scanner.
Stars: ✭ 775 (+434.48%)
Mutual labels:  kali-linux, reconnaissance
Awesome Asset Discovery
List of Awesome Asset Discovery Resources
Stars: ✭ 1,017 (+601.38%)
Mutual labels:  infosec, reconnaissance
Ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (+584.14%)
Mutual labels:  kali-linux, backdoor
Thoron
Thoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (-40%)
Mutual labels:  kali-linux, backdoor
Lime Rat
LimeRAT | Simple, yet powerful remote administration tool for Windows (RAT)
Stars: ✭ 663 (+357.24%)
Mutual labels:  trojan, backdoor
Python Honeypot
OWASP Honeypot, Automated Deception Framework.
Stars: ✭ 160 (+10.34%)
Mutual labels:  infosec, cybersecurity
Asnlookup
Leverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.
Stars: ✭ 163 (+12.41%)
Mutual labels:  infosec, reconnaissance
SimpleKeylogger
Simple Keylogger with smtp to send emails on your account using python works on linux and Windows
Stars: ✭ 32 (-77.93%)
Mutual labels:  infosec, keylogger
Tinkerershell
A simple python reverse shell written just for fun.
Stars: ✭ 62 (-57.24%)
Mutual labels:  backdoor, keylogger
Prismatica
Responsive Command and Control System
Stars: ✭ 81 (-44.14%)
Mutual labels:  infosec, cybersecurity
Malice
VirusTotal Wanna Be - Now with 100% more Hipster
Stars: ✭ 1,253 (+764.14%)
Mutual labels:  infosec, cybersecurity
61-120 of 1042 similar projects