0xjio / DeagleLinks
System Scanner for Windows
β18Updated 2 years ago
Alternatives and similar repositories for Deagle
Users that are interested in Deagle are comparing it to the libraries listed below
Sorting:
- A peer-to-peer routing protocol to run your decentralized network.β24Updated 3 years ago
- This will encrypt π€ your files using AES-256-CTR, then RSA-4096π΅βπ«to secure the exchange with the server, or can use the Tor SOCKS5 Prβ¦β74Updated last year
- An automated setup repository for developers, streamlining the download and installation of IDEs, packages, and tools. Simplify your devβ¦β17Updated 2 years ago
- Fully undetectable UAC Bypass exploit - https://youtu.be/KfOPW0XI99sβ17Updated 3 years ago
- This application is designed to help users recover lost or forgotten data such as Wi-Fi passwords, browser data, browser passwords, and oβ¦β29Updated 2 months ago
- Jarbou3 is rat tool coded in python with C&C which can accept multiple connections from clientsβ25Updated last year
- legacy Botnets source code Forked from github.com/malwaresβ24Updated 3 years ago
- Cross Platform Java RAT targeting Windows with a multitude of features. Built for Penetration Testers.β26Updated 4 years ago
- Malware and malicious applications databaseβ37Updated 11 months ago
- Slowloris via tor networkβ24Updated 9 months ago
- Proof of concept denial of service over TOR stress test toolβ41Updated 6 years ago
- the assembly shell and backdoor Trojanβ19Updated 3 years ago
- Windows Hacking FrameWork using Reverse Shellβ105Updated 2 months ago
- A Windows keylogger undetected by all major anti-virus. Log keys, clipboard, window titles and send logs to a server.β93Updated last year
- Persistent & Undetectable Malware Backdoorβ27Updated last year
- Remote Access Tool, Command & Control, based on the github project Ares, but written in python 3 with some extra features.β37Updated 4 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.β24Updated 4 years ago
- A tool for building remote access trojan.β5Updated last year
- Scan suspicious applications with over 60 different anti-viruses with a mere two clicks and five seconds!β40Updated 2 years ago
- Well, I have created this shit for educational pruposes (I think)β36Updated 2 years ago
- This Telegram bot is designed to perform advanced data searches based on multiple arguments such as URL, username, password, email, and mβ¦β15Updated 7 months ago
- Reverse shell written on python3β60Updated 4 years ago
- An Advance Python DDOS Tool Using MultiThread Socketsβ29Updated 3 years ago
- A Remote Administration Tool (RAT) for Windows written in C++ with a fancy C.L.I.β60Updated last year
- β10Updated 3 years ago
- π¨π»βπ» A great tool for Ethical Hackers, a malware programmed with Backdoor and Keylogger.β40Updated 4 years ago
- Inject Metasploit Shell Code in Legitimate Processβ11Updated 4 years ago
- FUD metasploit Persistence RATβ4Updated 2 years ago
- It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executabβ¦β43Updated 3 years ago
- Powerfull Windows Viruses by VBScript! In this file, There are many powerful viruses π that can damage your PC in a matter of seconds.β21Updated 4 years ago