You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
[Fugitive was made to offer resourcfulness to 'Osint Investigations' Fugitive will allow you to collect detailed information about "subjects" and in further development will become one of the best OSINT tools for your personal or professional activities]
⛔ "Sniffing" refers to monitoring Internet traffic in real time. Sniffers are programs or hardware devices that can spy on you and all your Internet activities. Sometimes legitimate, sometimes illegal, sniffers can make you feel unprotected
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate issues of dependency resolution involving deprecated modules.
This repostiory contains the python code of command and control trojan which will be controlled from the GitHub repo which contains the configuration file where attacker can specify the task which trojan has to do in the victim machine and then upload the same content / file in the private gihub repository of the attacker.
DANGER! DO NOT USE IT! I WARN YOU BEFORE! This script monitors and intercepts Tor traffic to detect and handle malicious activity. It utilizes the Scapy and Stem libraries to analyze network packets and interact with the Tor network.
🧬 A payload refers to the component of a computer virus that performs a malicious activity. In addition to the speed at which a virus spreads, the threat level of a virus is calculated by the damage it causes.