Python-Rootkit
Pieta
DISCONTINUED
Our great sponsors
Python-Rootkit | Pieta | |
---|---|---|
2 | 1 | |
437 | 27 | |
- | - | |
0.0 | 1.2 | |
almost 2 years ago | 6 months ago | |
Python | Python | |
- | GNU Affero General Public License v3.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Python-Rootkit
- What programming languages should I learn to become a successful pentester?
-
My first python project; a keylogger
As far as hiding it, you could try this to hide the window. You can also use Python-rootkit to hide the python process.
Pieta
What are some alternatives?
TheFatRat - Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .
Basic-Keylogger
apooxml - Generate YARA rules for OOXML documents.
disctopia-c2 - Windows Remote Administration Tool that uses Discord as C2
impfuzzy - Fuzzy Hash calculated from import API of PE files
teleRAT - Telegram RAT written in Python
HG8045Q - Pwning the Nuro issued Huawei HG8045Q
Backdoorcreator - Exploit toolkit
pupy - Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
warehouse - The Python Package Index
macro_pack - macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other formats for pentest, demo, and social engineering assessments. The goal of macro_pack is to simplify exploitation, antimalware bypass, and automatize the process from malicious macro and script generation to final document generation. It also provides a lot of helpful features useful for redteam or security research.