Huskee: Malware made in Python for Educational purposes

Overview

π‡π”π’πŠπ„π„


Caracteristicas:

  • Discord Token Grabber
  • Wifi Passwords Grabber
  • Google Chrome Passwords Grabber
  • Semi-Indetectable

Uso:

  • Debes editar la linea 219 en el archivo Huskee.py, en donde dice tu_token debes poner tu token de la API de AnonFiles

  • Si deseas, puedes convertir el archivo a .exe con el archivo build.py

  • Huskee es un Malware hecho en Python con propositos de Educacion y no debe ser usado para una finalidad diferente

    Huskee recolecta diferentes datos, los escribe un archivo y los sube mediante la API de Anonfiles para mas seguridad, luego borra el archivo

    Owner
    chew
    I'ma little programmer. I love Python and Javascript.
    chew
    A Radare2 based Python module for Binary Analysis and Reverse Engineering.

    Zepu1chr3 A Radare2 based Python module for Binary Analysis and Reverse Engineering. Installation You can simply run this command. pip3 install zepu1c

    Mehmet Ali KERİMOĞLU 5 Aug 25, 2022
    Generate malicious files using recently published homoglyphic-attack (CVE-2021-42694)

    CVE-2021-42694 Generate malicious files using recently published homoglyph-attack vulnerability, which was discovered at least in C, C++, C#, Go, Pyth

    js-on 17 Dec 11, 2022
    Fuzzercorn - Bring libfuzzer to Unicorn

    Fuzzercorn libfuzzer bindings for Unicorn. API // The main entry point of the fu

    lazymio 23 Nov 17, 2022
    LdapRelayScan - Check for LDAP protections regarding the relay of NTLM authentication

    LDAP Relay Scan A tool to check Domain Controllers for LDAP server protections r

    315 Dec 18, 2022
    OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the

    omigood (OM I GOOD?) This repository contains a free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threa

    Marco Simioni 13 Jul 13, 2022
    Abusing Microsoft 365 OAuth Authorization Flow for Phishing Attack

    O365DevicePhish Microsoft365_devicePhish Abusing Microsoft 365 OAuth Authorization Flow for Phishing Attack This is a simple proof-of-concept script t

    Trewis [work] Scotch 4 Sep 23, 2022
    Everything I needed to understand what was going on with "Spring4Shell" - translated source materials, exploit, links to demo apps, and more.

    springcore-0day-en These are all my notes from the alleged confirmed! 0day dropped on 2022-03-29. This vulnerability is commonly referred to as "Sprin

    Chris Partridge 105 Nov 26, 2022
    This is a Python program that implements a vacuum cleaner as an Artificial Intelligence.

    Vacuum-Cleaner Python3 This is a Python3 agent that implements a simulator for a vacuum cleaner and it is introduction to Artificial Intelligence. A s

    Abdultawwab Safarji 6 Nov 14, 2022
    Safe Policy Optimization with Local Features

    Safe Policy Optimization with Local Feature (SPO-LF) This is the source-code for implementing the algorithms in the paper "Safe Policy Optimization wi

    Akifumi Wachi 6 Jun 05, 2022
    Python low-interaction honeyclient

    Thug The number of client-side attacks has grown significantly in the past few years shifting focus on poorly protected vulnerable clients. Just as th

    Angelo Dell'Aera 896 Dec 19, 2022
    All in One CRACKER911181's Tool. This Tool For Hacking and Pentesting. 🎭

    All in One CRACKER911181's Tool. This Tool For Hacking and Pentesting. 🎭

    Cracker 331 Jan 01, 2023
    Open-source keylogger write in python

    Python open-source keylogger Language Python open-source keylogger using pynput module Using Install dependences in archive setup.py or install.sh in

    Dio brando 4 Jan 15, 2022
    DNS hijacking via dead records automation tool

    DeadDNS Multi-threaded DNS hijacking via dead records automation tool How it works 1) Dig provided subdomains file for dead DNS records. 2) Dig the fo

    45 Dec 20, 2022
    Chromepass - Hacking Chrome Saved Passwords

    Chromepass - Hacking Chrome Saved Passwords and Cookies View Demo Β· Report Bug Β· Request Feature Table of Contents About the Project AV Detection Gett

    darkArp 622 Jan 04, 2023
    Cve-2022-23131 - Cve-2022-23131 zabbix-saml-bypass-exp

    cve-2022-23131 cve-2022-23131 zabbix-saml-bypass-exp replace [zbx_signed_session

    δΈœζ–Ήζœ‰ι±ΌεδΈΊε’Έ 135 Dec 14, 2022
    Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk

    Repo for "The Crown: Exploratory Analysis of Nim Malware" DEF CON 615 talk

    HuskyHacks 43 Dec 03, 2022
    ♻️ Password Generator (PSG) πŸ“š This plugin is made for more familiarity with Python, but can also be used to create passwords

    About Tool This plugin is made for more familiarity with Python, but can also be used to create passwords.

    STgazing 2 Jul 23, 2022
    Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.

    The Recon-ng Framework Recon-ng content now available on Pluralsight! Recon-ng is a full-featured reconnaissance framework designed with the goal of p

    2.4k Jan 07, 2023
    RCE 0-day for GhostScript 9.50 - Payload generator

    RCE-0-day-for-GhostScript-9.50 PoC for RCE 0-day for GhostScript 9.50 - Payload generator The PoC in python generates payload when exploited for a 0-d

    534 Dec 14, 2022
    Brute smb share - Brute force a SMB share

    brute_smb_share I wrote this small PoC after bumping into SMB servers where Hydr

    devloop 3 Feb 21, 2022