Huskee: Malware made in Python for Educational purposes

Overview

𝐇𝐔𝐒𝐊𝐄𝐄


Caracteristicas:

  • Discord Token Grabber
  • Wifi Passwords Grabber
  • Google Chrome Passwords Grabber
  • Semi-Indetectable

Uso:

  • Debes editar la linea 219 en el archivo Huskee.py, en donde dice tu_token debes poner tu token de la API de AnonFiles

  • Si deseas, puedes convertir el archivo a .exe con el archivo build.py

  • Huskee es un Malware hecho en Python con propositos de Educacion y no debe ser usado para una finalidad diferente

    Huskee recolecta diferentes datos, los escribe un archivo y los sube mediante la API de Anonfiles para mas seguridad, luego borra el archivo

    Owner
    chew
    I'ma little programmer. I love Python and Javascript.
    chew
    A semi-automatic osint/recon framework.

    Smog Framework A semi-automatic osint/recon framework. Requirements git Python = 3.8 How to use it

    toast 22 Oct 17, 2022
    Dahua IPC/VTH/VTO devices auth bypass exploit

    CVE-2021-33044 Dahua IPC/VTH/VTO devices auth bypass exploit About: The identity authentication bypass vulnerability found in some Dahua products duri

    Ashish Kunwar 23 Dec 02, 2022
    Proof of concept to check if hosts are vulnerable to CVE-2021-41773

    CVE-2021-41773 PoC Proof of concept to check if hosts are vulnerable to CVE-2021-41773. Description (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CV

    Jordan Jay 43 Nov 09, 2022
    An OSINT tool that searches for devices directly connected to the internet (IoT) with a user specified query. It returns results for Webcams, Traffic lights, Refridgerators, Smart TVs etc.

    An OSINT tool that searches for devices directly connected to the internet (IoT) with a user specified query. It returns results for Webcams, Traffic

    Richard Mwewa 48 Nov 20, 2022
    Apache Flink 目录遍历漏洞批量检测 (CVE-2020-17519)

    使用方法&免责声明 该脚本为Apache Flink 目录遍历漏洞批量检测 (CVE-2020-17519)。 使用方法:Python CVE-2020-17519.py urls.txt urls.txt 中每个url为一行,漏洞地址输出在vul.txt中 影响版本: Apache Flink 1

    45 Sep 21, 2022
    Grafana-0Day-Vuln-POC

    Grafana V8.0+版本存在未授权任意文件读取 0Day漏洞 - POC 1 漏洞信息 1.1 基本信息 漏洞厂商:Grafana 厂商官网:https://grafana.com/ 1.2 漏洞描述 Grafana是一个跨平台、开源的数据可视化网络应用程序平台。用户配置连接的数据源之后,Gr

    mik1th0n 3 Dec 13, 2021
    A tool for making python source difficult to read.

    obscurepy Description A tool for obscuring, or making python source code difficult to read. Table of Contents Installation Limitations Usage Disclaime

    Andrew Christiansen 10 Jul 31, 2022
    Multi Brute Force Facebook - Crack Facebook With Login - Free For Now

    ✭ SAKERA CRACK Made With ❤️ By Denventa, Araya, Dapunta Author: - Denventa - Araya Dev - Dapunta Khurayra X ⇨ Fitur Login [✯] Login Cookies ⇨ Ins

    Dapunta ID 26 Jan 01, 2023
    Receive notifications/alerts on the most recent disclosed CVE's.

    Receive notifications on the most recent disclosed CVE's.

    Ameliorate 7 Nov 24, 2022
    test application for the licence key web app.

    licence_software_test_app Make sure you set your database values in a .env file to the folder. Install MYSQL connector: pip install mysql-connector-py

    Carl Beattie 1 Oct 28, 2021
    聚合Github上已有的Poc或者Exp,CVE信息来自CVE官网。Auto Collect Poc Or CVE from Github by CVE ID.

    PocOrExp in Github 聚合Github上已有的Poc或者Exp,CVE信息来自CVE官网 注意:只通过通用的CVE号聚合,因此对于MS17-010等Windows编号漏洞以及著名的有绰号的漏洞,还是自己检索一下比较好 Usage python3 exp.py -h usage: ex

    567 Dec 30, 2022
    Template for new OSINT command-line tools

    OSINT cli tool skeleton Template for new OSINT command-line tools. Press button "Use this template" to generate your own tool repository. See INSTALL.

    36 Dec 20, 2022
    Python sandbox runners for executing code in isolation aka snekbox.

    Python sandbox runners for executing code in isolation aka snekbox.

    Python Discord 164 Dec 20, 2022
    SSLyze is a fast and powerful SSL/TLS scanning tool and Python library.

    SSLyze SSLyze is a fast and powerful SSL/TLS scanning tool and Python library. SSLyze can analyze the SSL/TLS configuration of a server by connecting

    Alban Diquet 2.8k Jan 03, 2023
    Cve-2022-23131 - Cve-2022-23131 zabbix-saml-bypass-exp

    cve-2022-23131 cve-2022-23131 zabbix-saml-bypass-exp replace [zbx_signed_session

    东方有鱼名为咸 135 Dec 14, 2022
    Hashpic - Hashpic creates an image from a MD5 or SHA512 hash

    Hashpic Hashpic creates an image from the MD5 hash of your input. Since v0.2.0 i

    0xflotus 15 Nov 23, 2022
    Reverse engineered Parler API

    Parler's unofficial API with all endpoints present in their iOS app as of 08/12/2020. For the most part undocumented, but the error responses are alre

    393 Nov 26, 2022
    Collection Of Discord Hacking Tools / Fun Stuff / Exploits That Is Completely Made Using Python.

    Venom Collection Of Discord Hacking Tools / Fun Stuff / Exploits That Is Completely Made Using Python. Report Bug · Request Feature Contributing Well,

    PndaBoi 25 Dec 06, 2022
    edgedressing leverages a Windows "feature" in order to force a target's Edge browser to open. This browser is then directed to a URL of choice.

    edgedressing One day while experimenting with airpwn-ng, I noticed unexpected GET requests on the target node. The node in question happened to be a W

    stryngs 43 Dec 23, 2022
    Script checks provided domains for log4j vulnerability

    log4j Script checks provided domains for log4j vulnerability. A token is created with canarytokens.org and passed as header at request for a single do

    Matthias Nehls 2 Dec 12, 2021