Cyber-Dioxide / TrojanLinks
This tool will create a .exe file which will send you all the information of victim once the file executes!
☆36Updated 7 months ago
Alternatives and similar repositories for Trojan
Users that are interested in Trojan are comparing it to the libraries listed below
Sorting:
- Meterpreter payload for all platforms☆70Updated 3 years ago
- Virus Repository☆45Updated 9 months ago
- The purpose of this tool is to automate the payload Creation Process. U can Create Payloads For All Types of OS in Seconds.☆52Updated last year
- SADBOT - A simple tool for exploitation on android devices via ADB, users can find vulnerable devices using shodan search.☆40Updated 2 years ago
- IP and geolocation tracking tool☆55Updated 9 months ago
- Tool For Frontal Camera Hack.☆54Updated last year
- Get information of any phone number. A simple color full tool in python3 for extracting information.☆59Updated 8 months ago
- My Nmap without root privileges! For hackers.☆38Updated last year
- #Just simple program to spoofing device by sending malicious link☆30Updated 3 years ago
- Virus Repository☆23Updated 3 years ago
- A very user friendly and advanced phishing toolkit made for hackers☆35Updated 3 years ago
- The "Mailer" tool is a Python script for conducting simulated cyber attacks, including phishing attacks on social media platforms like Fa…☆61Updated 2 months ago
- The ultimate Metasploit apk binder with legit apk written in python3☆33Updated 3 years ago
- Admin Panel Bruteforce☆69Updated 9 months ago
- Binaries Payloads Web Payloads Scripting Payloads Shellcode☆39Updated 6 years ago
- The Most Powerful Fake Page Redirecting tool...☆56Updated 3 years ago
- Facebook bot dumper&scraper☆34Updated 9 months ago
- Automatic XSS Vulnerability Scanner, Dorker, and Payload Injector☆22Updated 9 months ago
- A tool to generate valid ip addresses of 55 countries. These ip's can be used for OpenBullet.☆31Updated 8 months ago
- Distributed Denial of Service - Website Stress☆38Updated 9 months ago
- Black-Tool-For-Windows☆15Updated 3 years ago
- PRECISELY PINPOINT PEDO LOCATION THROUGH THE ART OF SOCIAL ENGINEERING☆24Updated 3 months ago
- People Profiler (fake script)☆23Updated 9 months ago
- Generate Professional Phishing Emails Fast And Easy☆25Updated 3 years ago
- GUI based tool to track location and more info of mobile numbers☆74Updated last year
- Websites Vulnerability Scanner☆72Updated last month
- A powerfull recon cat tool☆23Updated last year
- A good tool to hide phishing traps or cut links.☆37Updated last year
- Designed to scan and exploit vulnerabilities within Tor hidden services. TORhunter allows most tools to work as normal while resolving .o…☆108Updated 3 years ago
- Email Spoofing Tool.☆8Updated 4 years ago