Skip to content
View CryptonicSphinx's full-sized avatar
🎯
Focusing
🎯
Focusing
  • USA

Block or report CryptonicSphinx

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Simple python backdoor with Ngrok tunnel support

Python 206 53 Updated Dec 9, 2023

The open-sourced Python toolbox for backdoor attacks and defenses.

Python 626 87 Updated Sep 27, 2025

Python botnet and backdoor

Python 1,602 475 Updated Mar 2, 2023

A python keylogger that does more than any other keylogger - Key logger, Clicks logger and Screenshots

Python 484 161 Updated Oct 14, 2024

python phishing tool

CSS 40 12 Updated Sep 25, 2025

This is An Offensive Hacking Tool which can be used by hackers and for penetration testing purposes. Hack Responsibly!!!!!!!

Python 102 13 Updated Jul 8, 2024

Python Exploitation is a collection of special tools for providing high quality penetration testing using pure python programming language.

Python 50 8 Updated Oct 13, 2024

A python based tool for exploiting and managing Android devices via ADB

Python 863 123 Updated Mar 12, 2023

Authorizer is a Password Manager for Android. It emulates an HID keyboard over USB and enters your credentials on your target device. Additionally it supports OTP 🔑📴

Java 559 60 Updated Apr 19, 2024

ESP32 software USB host through general IO pins. We can connect up to 4 USB-LS HID (keyboard mouse joystick) devices simultaneously.

C 480 58 Updated Feb 23, 2025

A tool for in-depth analysis of USB HID devices communication

C++ 581 59 Updated Nov 18, 2025

Brute-force password cracker. 'You forgot your password too?'

Java 23 10 Updated Dec 23, 2023

WEP Attack - Easy breaking WEP networks in one line command

Shell 8 6 Updated May 19, 2015

The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.

Go 18,648 1,603 Updated Dec 15, 2025

A curated list of tools useful within the field of cyber security, for both blue and red team operations.

98 8 Updated Dec 20, 2024

A collection of Cobalt Strike Aggressor scripts.

PowerShell 105 28 Updated Jan 3, 2022

一个攻防知识库。A knowledge base for red teaming and offensive security.

Python 4,033 710 Updated Dec 7, 2025

Bits and bytes of Python from the Internet

3,245 677 Updated Jul 4, 2023

Open source pre-operation C2 server based on python and powershell

Python 762 158 Updated Jul 6, 2021

渗透测试C2、支持Lua插件扩展、域前置/CDN上线、自定义profile、前置sRDI、文件管理、进程管理、内存加载、截图、反向代理、分组管理

Go 1,369 210 Updated Feb 28, 2025

DeimosC2 is a Golang command and control framework for post-exploitation.

Vue 1,143 169 Updated Apr 17, 2025

Starkiller is a Frontend for PowerShell Empire.

Vue 1,595 229 Updated Dec 12, 2025

A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.

PowerShell 2,070 357 Updated Nov 20, 2025

Covenant is a collaborative .NET C2 framework for red teamers.

C# 4,568 821 Updated Jul 18, 2024

Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.

PowerShell 4,967 670 Updated Dec 12, 2025

🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources

Python 1,509 302 Updated Jun 4, 2025

Projects for security students

Python 2,763 415 Updated Oct 20, 2025

🏴‍☠️ PortRaider - Your Network Port Scanning Navigator 🔍 Uncover the mysteries of open and closed ports, scan common services, and detect vulnerabilities with this powerful command-line tool. Save …

Shell 6 2 Updated Jun 15, 2024

Man in the middle tool (arp poisoning, dns spoofing, etc.)

Python 4 Updated May 14, 2023
Next