SlowsieNT / TorFlowLinks
Conquer the deep ocean, host an .onion site fast!
☆16Updated 3 years ago
Alternatives and similar repositories for TorFlow
Users that are interested in TorFlow are comparing it to the libraries listed below
Sorting:
- Simple way to disable/rename buttons from a task manager☆30Updated 5 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆32Updated 4 years ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆32Updated 3 years ago
- Obfuscator for batch script☆63Updated last year
- UAC Bypass for windows☆38Updated 5 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Updated 3 years ago
- Injecting shellcode into a process memory and executing it in C#☆52Updated 3 years ago
- DarkRats Standalone HVNC☆25Updated 3 years ago
- It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executab…☆48Updated 3 years ago
- This script make any windows compatible with RDP connection☆21Updated 6 months ago
- Simple keylogger written in C# which is ready for modifications.☆14Updated 4 years ago
- C# Codedom example / builder☆24Updated 5 years ago
- A simple AES malware crypter☆15Updated 7 years ago
- a basic IDE compiler for C# and VB.NET using codedom☆45Updated 6 years ago
- Analyzers for Portable Executable anomalies and other malware behavior.☆33Updated last month
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Updated 6 years ago
- Generate a ms batch file and inject a files inside of it. When the batch is executed, the files are extracted and executed.☆21Updated 6 years ago
- C# Admin Control Panel Finder For Windows☆46Updated 6 years ago
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆10Updated 4 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆13Updated 4 years ago
- 🚀 Builder of Malware Loader☆13Updated 5 years ago
- Hash Checker Bypass and Process Hacker☆18Updated 4 years ago
- Download a .NET payload and run it on memory☆70Updated 6 years ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Updated 3 years ago
- A windows kernel-mode rootkit with remote control☆12Updated 3 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 6 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Updated 5 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆23Updated 5 years ago
- Download payload to disk and install it to startup then melt.☆35Updated 6 years ago
- ☆16Updated 4 years ago