LazoVelko / Image-To-ASCIILinks
Convert images to ASCII art.
☆55Updated 4 years ago
Alternatives and similar repositories for Image-To-ASCII
Users that are interested in Image-To-ASCII are comparing it to the libraries listed below
Sorting:
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆27Updated 9 years ago
- Create shellcode from executable or assembly code☆12Updated 7 years ago
- Properly Engineered Infection Kit, A framework for creating malware in C#. Multi-threaded, comes with a built-in MSIL obfuscator and pack…☆15Updated 14 years ago
- ZeroRemote Trojan SRC Extract☆19Updated 8 years ago
- An example in C# for programmatically calling UAC to escalate to admin☆14Updated 6 years ago
- This is the linux version of the R.A.T client written in c#☆11Updated 8 years ago
- PowerShell Runspace Connect-Back Shell☆26Updated 9 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 8 years ago
- A Remote Administration Tool coded in C#☆20Updated 13 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- Uses AES to run encrypted shellcode using Python and ctypes☆15Updated 9 years ago
- Simple decrypter for strings used in SamSam Ransomware samples.☆18Updated 5 years ago
- Viper is a brute-force password cracker.☆24Updated 9 years ago
- Various Crypter Project☆52Updated 11 years ago
- ☆19Updated 7 years ago
- SkyRAT - Powershell Remote Administration Tool☆33Updated 7 years ago
- Simple Antivirus☆10Updated 8 years ago
- Multi-threaded Instagram account cracker☆17Updated 7 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 8 years ago
- Automatically exported from code.google.com/p/hookme☆13Updated 9 years ago
- Proof of concept demo for a tool that listens for keywords, and records audio to a file.☆12Updated 8 years ago
- A library which makes modification of browsers' behavior easy.☆10Updated 4 years ago
- Simple AutoIt crypter.☆11Updated 8 years ago
- Monitor Files and Folders for Changes in Real Time .☆10Updated 6 years ago
- ☆39Updated 8 years ago
- Source code of my KeygenMe V7 challenge☆22Updated 7 years ago
- Collection of cracked malware☆14Updated 6 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 12 years ago
- Proof of Concept of the steganographic algorithms implemented by APT 29 (Hammertos)☆10Updated 6 years ago
- The Minary main GUI.☆21Updated 4 years ago