KbaHaxor / SocietyPoisonerTrojanView external linksLinks
Open Source trojan for android.
☆21Mar 21, 2024Updated last year
Alternatives and similar repositories for SocietyPoisonerTrojan
Users that are interested in SocietyPoisonerTrojan are comparing it to the libraries listed below
Sorting:
- Windows payload written in C++, gives total control to the infected machine via reverse-TCP sockets from a web application☆18Feb 10, 2017Updated 9 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆10Apr 18, 2017Updated 8 years ago
- my personal .bashrc files, with all my alias, tricks and ascii art☆13Oct 22, 2020Updated 5 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- SAS_Registry_Hack (Super Administrator Suppressor) is a Simple Reg. File which totally disables every user control (UAC) and a little mor…☆18Oct 22, 2020Updated 5 years ago
- PowerShell Reverse HTTPs Shell☆30Nov 14, 2014Updated 11 years ago
- Heap implementation for some JavaScript VM☆27Apr 8, 2015Updated 10 years ago
- Wide internet scanner for etherum and other bitcoin mining devices using default SSH credentials☆48Mar 22, 2022Updated 3 years ago
- Android trojan starter apk☆19Sep 15, 2016Updated 9 years ago
- A Street Art Notepad++ Style for Different Programming Languages☆20Oct 22, 2020Updated 5 years ago
- Android trojan server part written in PHP☆22Sep 11, 2016Updated 9 years ago
- Disassembling binaries to neat asm sources.☆20Feb 5, 2018Updated 8 years ago
- PoC malware built by copy-paste☆25Apr 10, 2021Updated 4 years ago
- detect trojans in an easy way 🛡️☆29Jul 25, 2018Updated 7 years ago
- This test suite contains over 40 different test cases that have proven to work with different mobile browsers in my research or testing S…☆30Jul 12, 2019Updated 6 years ago
- Web for Pentester I☆10Sep 21, 2018Updated 7 years ago
- Backdoor implementation in Ruby (testing)☆30Jul 6, 2015Updated 10 years ago
- Android Trojan☆197Feb 25, 2015Updated 10 years ago
- In this project a robot that can be operated by authorized person or operator is implemented. For this purpose we use a face re…☆12Jun 20, 2018Updated 7 years ago
- Windows 10 Exploit☆30Oct 29, 2018Updated 7 years ago
- Plugin metademands for GLPI☆12Updated this week
- Using Raspberry Pi, Python, MQTT, Home Assistant, a relay, and a magnetic proximity sensor, I open, close, stop, and report the status of…☆11Nov 7, 2016Updated 9 years ago
- A little WinDbg extension to help dump the state of Win32k Type Isolation structures.☆38Feb 2, 2018Updated 8 years ago
- Python backdoor that uses http post/get requests to communicate☆42Aug 24, 2016Updated 9 years ago
- Memcache hacking tool.☆47Apr 20, 2017Updated 8 years ago
- Get ALL of the AKER Kit source file packs. If you love them, don't forget to tell us about it - aaron@akerkits.com☆10May 24, 2017Updated 8 years ago
- SAPProx is a proof of concept tool for intercepting and modifying SAP GUI (DIAG protocol) traffic.☆13Apr 20, 2017Updated 8 years ago
- Solutions for CSS Layout Exercises☆12Feb 5, 2021Updated 5 years ago
- ISPConfig 3.1 for FreeBSD 11.1-RELEASE☆11Jun 29, 2019Updated 6 years ago
- Controlling your MSR with Visual Basic 6☆19Jul 1, 2015Updated 10 years ago
- Passive Network Audit Framework☆32May 17, 2018Updated 7 years ago
- ☆11Aug 23, 2022Updated 3 years ago
- Write ups for DRDO CTF☆10Jan 13, 2018Updated 8 years ago
- Some of my crypto challenges☆11Jun 21, 2020Updated 5 years ago
- Create a netfilter queue and display packets passing through. Can also save those packets to a pcap file.☆13Dec 3, 2011Updated 14 years ago
- Decrypt AES256GCM-encrypted data in Apple Pay Payment Tokens.☆10Nov 30, 2018Updated 7 years ago
- Baidu 100G Chasiss Switch hardware spec☆12Sep 20, 2017Updated 8 years ago
- Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but e…☆41Oct 14, 2021Updated 4 years ago