Huskee: Malware made in Python for Educational purposes

Overview

𝐇𝐔𝐒𝐊𝐄𝐄


Caracteristicas:

  • Discord Token Grabber
  • Wifi Passwords Grabber
  • Google Chrome Passwords Grabber
  • Semi-Indetectable

Uso:

  • Debes editar la linea 219 en el archivo Huskee.py, en donde dice tu_token debes poner tu token de la API de AnonFiles

  • Si deseas, puedes convertir el archivo a .exe con el archivo build.py

  • Huskee es un Malware hecho en Python con propositos de Educacion y no debe ser usado para una finalidad diferente

    Huskee recolecta diferentes datos, los escribe un archivo y los sube mediante la API de Anonfiles para mas seguridad, luego borra el archivo

    Owner
    chew
    I'ma little programmer. I love Python and Javascript.
    chew
    A Safer PoC for CVE-2022-22965 (Spring4Shell)

    Safer_PoC_CVE-2022-22965 A Safer PoC for CVE-2022-22965 (Spring4Shell) Functionality Creates a file called CVE_2022-22965_exploited.txt in the tomcat

    Colin Cowie 46 Nov 12, 2022
    Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures

    Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and auto-completion to your preferred editor once it is configured.

    Stamus Networks 39 Nov 28, 2022
    M.E.A.T. - Mobile Evidence Acquisition Toolkit

    M.E.A.T. - Mobile Evidence Acquisition Toolkit Meet M.E.A.T! From Jack Farley - BlackStone Discovery This toolkit aims to help forensicators perform d

    1 Nov 11, 2021
    BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.

    Follow us on Twitter! BoobSnail BoobSnail allows generating XLM (Excel 4.0) macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro gen

    STM Cyber 232 Nov 21, 2022
    QHack-2022 - Solutions to the Coding Challenges of QHack 2022

    QHack 2022 Problems from Coding Challenges 2022. Rules and how it works To test

    Isacco Gobbi 1 Feb 14, 2022
    Microsoft Exchange Server SSRF漏洞(CVE-2021-26855)

    Microsoft_Exchange_Server_SSRF_CVE-2021-26855 zoomeye dork:app:"Microsoft Exchange Server" 使用Seebug工具箱及pocsuite3编写的脚本Microsoft_Exchange_Server_SSRF_CV

    conjojo 37 Nov 12, 2022
    SonicWall SMA-100 Unauth RCE Exploit (CVE-2021-20038)

    Bad Blood Bad Blood is an exploit for CVE-2021-20038, a stack-based buffer overflow in the httpd binary of SMA-100 series systems using firmware versi

    Jake Baines 80 Dec 29, 2022
    Keystroke logging, often referred to as keylogging or keyboard capturing

    Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware

    Harsha G 2 Jan 11, 2022
    ⛤Keylogger Generator for Windows written in Python⛤

    ⛤Keylogger Generator for Windows written in Python⛤

    FZGbzuw412 33 Nov 24, 2022
    Tools ini digunakan untuk krekk pacebuk:v

    E-Crack By Aang-XD Fitur Login • Login via token facebook • Login via cookie facebook Install On Termux $ pkg update && pkg upgrade $ pkg install pyth

    Aang Ardiansyah-XD 2 Dec 24, 2021
    CloudFlare reconnaissance, tries to uncover the IP behind CF.

    CloudFlare reconnaissance, tries to uncover the IP behind CF.

    Neospace 8 Dec 03, 2021
    ssh-audit is a tool for ssh server & client configuration auditing.

    SSH server & client auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)

    Joe Testa 1.4k Dec 31, 2022
    Dumping revelant information on compromised targets without AV detection

    DonPAPI Dumping revelant information on compromised targets without AV detection DPAPI dumping Lots of credentials are protected by DPAPI (link ) We a

    Login Securite 580 Jan 09, 2023
    Example for the NFT 3D Collectibles using Blender Scripting (Python).

    NFT Collectibles using Blender Python What is this? This project is to demonstrate for generating NFT Collectible Avatar-Styled images. For details, p

    hideckies 48 Nov 26, 2022
    Huskee: Malware made in Python for Educational purposes

    𝐇𝐔𝐒𝐊𝐄𝐄 Caracteristicas: Discord Token Grabber Wifi Passwords Grabber Googl

    chew 4 Aug 17, 2022
    🎻 Modularized exploit generation framework

    Modularized exploit generation framework for x86_64 binaries Overview This project is still at early stage of development, so you might want to come b

    ᴀᴇꜱᴏᴘʜᴏʀ 30 Jan 17, 2022
    SeaSurf is a Flask extension for preventing cross-site request forgery (CSRF).

    Flask-SeaSurf SeaSurf is a Flask extension for preventing cross-site request forgery (CSRF). CSRF vulnerabilities have been found in large and popular

    Max Countryman 183 Dec 28, 2022
    Denial Attacks by Various Methods

    Denial Service Attack Denial Attacks by Various Methods IIIIIIIIIIIIIIIIIIII PPPPPPPPPPPPPPPPP VVVVVVVV VVVVVVVV I::

    Baris Dincer 9 Nov 26, 2022
    This repo created for bypassing Widevine L3 DRM and obtaining keys.

    First run: Copy headers (with cookies) of POST license request from browser to headers.py like dictionary. pip install -r requirements.txt # if doesn'

    Mikhail 263 Jan 07, 2023
    edgedressing leverages a Windows "feature" in order to force a target's Edge browser to open. This browser is then directed to a URL of choice.

    edgedressing One day while experimenting with airpwn-ng, I noticed unexpected GET requests on the target node. The node in question happened to be a W

    stryngs 43 Dec 23, 2022