Huskee: Malware made in Python for Educational purposes

Overview

𝐇𝐔𝐒𝐊𝐄𝐄


Caracteristicas:

  • Discord Token Grabber
  • Wifi Passwords Grabber
  • Google Chrome Passwords Grabber
  • Semi-Indetectable

Uso:

  • Debes editar la linea 219 en el archivo Huskee.py, en donde dice tu_token debes poner tu token de la API de AnonFiles

  • Si deseas, puedes convertir el archivo a .exe con el archivo build.py

  • Huskee es un Malware hecho en Python con propositos de Educacion y no debe ser usado para una finalidad diferente

    Huskee recolecta diferentes datos, los escribe un archivo y los sube mediante la API de Anonfiles para mas seguridad, luego borra el archivo

    Owner
    chew
    I'ma little programmer. I love Python and Javascript.
    chew
    All in One CRACKER911181's Tool. This Tool For Hacking and Pentesting.🎭

    This is A Python & Bash Programming Based Termux-Tool Created By CRACKER911181. This Tool Created For Hacking and Pentesting. If You Use This Tool To Evil Purpose,The Owner Will Never be Responsible

    CRACKER911181 1 Jan 10, 2022
    Sqli-Scanner is a python3 script written to scan websites for SQL injection vulnerabilities

    Sqli-Scanner is a python3 script written to scan websites for SQL injection vulnerabilities Features 1 Scan one website 2 Scan multiple websites Insta

    Anontemitayo 9 Dec 30, 2022
    Brute Force Guess the password for Instgram accounts with python

    Brute-Force-instagram Guess the password for Instgram accounts Tool features : It has two modes: 1- Combo system from you 2- Automatic (random) system

    45 Dec 11, 2022
    Compilation of resources and insights that helped me on my journey to data scientist

    Compilation of resources and insights that helped me on my journey to data scientist

    Conor Dewey 1.5k Jan 02, 2023
    An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.

    Log4JHunt An automated, reliable scanner for the Log4Shell CVE-2021-44228 vulnerability. Video demo: Usage Here the help usage: $ python3 log4jhunt.py

    RedHunt Labs 39 Nov 21, 2022
    2022-bridge - Example code belonging to the Bridge pattern video

    Let's Take The Bridge Pattern To The Next Level This video covers how the bridge

    11 Jun 14, 2022
    Tools for converting Nintendo DS binaries to an ELF file for Ghidra/IDA

    nds2elf Requirements nds2elf.py uses LIEF and template.elf to form a new binary. LIEF is available via pip: pip3 install lief Usage DSi and DSi-enhan

    Max Thomas 17 Aug 14, 2022
    Writing and posting code throughout my new journey into python!

    bootleg-productions consider this account to be a journal for me to record my progress throughout my python journey feel free to copy codes from this

    1 Dec 30, 2021
    Fast and customizable vulnerability scanner For JIRA written in Python

    Fast and customizable vulnerability scanner For JIRA. 🤔 What is this? Jira-Lens 🔍 is a Python Based vulnerability Scanner for JIRA. Jira is a propri

    Mayank Pandey 185 Dec 25, 2022
    Convert a collection of features to a fixed-dimensional matrix using the hashing trick.

    FeatureHasher Convert a collection of features to a fixed-dimensional matrix using the hashing trick. Note, this requires Jina=2.2.4. Example Here I

    Jina AI 5 Mar 15, 2022
    Exploit tool for Adminer 1.0 up to 4.6.2 Arbitrary File Read vulnerability

    AdminerRead Exploit tool for Adminer 1.0 up to 4.6.2 Arbitrary File Read vulnerability Installation git clone https://github.com/p0dalirius/AdminerRea

    Podalirius 58 Dec 05, 2022
    EMBArk - The firmware security scanning environment

    Embark is being developed to provide the firmware security analyzer emba as a containerized service and to ease accessibility to emba regardless of system and operating system.

    emba 175 Dec 14, 2022
    Crypto Meta Extractor

    Crypto Meta Extractor This repository contains the code which extracts some metadata of all the cryptocurrencies listed (9K) on CoinMarketCap. Coding

    Samyak Jain 3 Jul 03, 2022
    A scanner and a proof of sample exploit for log4j RCE CVE-2021-44228

    1.Create a Sample Vulnerable Application . 2.Start a netcat listner . 3.Run the exploit . 5.Use jdk1.8.0_20 for better results . Exploit-db - https://

    Isuru Umayanga 7 Aug 06, 2022
    Burp Extensions

    Burp Extensions This is a collection of extensions to Burp Suite that I have written. getAllParams.py - Version 1.2 This is a python extension that ru

    /XNL-h4ck3r 364 Dec 30, 2022
    For educational purposes only. (Uzbek Edition)

    DISCLAIMER 💣 Ushbu skriptdagi materiallar bilan bog'liq har qanday xatti-harakatlar faqat sizning javobgarligingizdir. Ushbu skriptdagi ma'lumotlarda

    Husniddin Murodov 1 Feb 12, 2022
    windows电脑查看全部连接过的WiFi密码

    python WIFI历史密码查看器 WIFI密码查看器 原理 win+R,输入cmd打开命令行窗口 #这个命令可以列出你所有连接过的wifi netsh wlan show profiles #替换你要查找的WiFi名称,就可以显示出这个wifi的所有信息,包括密码 netsh wlan show

    GMYXDS 15 Dec 22, 2022
    A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability

    log4j-shell-poc A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability. Recently there was a new vulnerability in log4j, a java loggin

    koz 1.5k Jan 04, 2023
    Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.

    The Recon-ng Framework Recon-ng content now available on Pluralsight! Recon-ng is a full-featured reconnaissance framework designed with the goal of p

    2.4k Jan 07, 2023
    Privilege escalation with polkit - CVE-2021-3560

    Polkit-exploit - CVE-2021-3560 Privilege escalation with polkit - CVE-2021-3560 Summary CVE-2021-3560 is an authentication bypass on polkit, which all

    Ahmad Almorabea 95 Dec 27, 2022