air01a / trojan
Home made trojan (c/c++)
☆11Updated last year
Alternatives and similar repositories for trojan:
Users that are interested in trojan are comparing it to the libraries listed below
- ☆34Updated 8 years ago
- Scripts that aren't PowerShell☆48Updated 5 years ago
- Automatic backdooring apk with meterpreter (PoC)☆51Updated 8 years ago
- Multi-threaded SSH Password Auditor☆93Updated 11 years ago
- Small Backdoor/rootkit for linux kernel☆21Updated 11 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆60Updated 9 years ago
- pwning & info gathering via user browser☆39Updated 9 years ago
- Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but e…☆41Updated 3 years ago
- Multi theaded DNS bruteforcing☆12Updated 10 years ago
- Exploits used on hacking CTF's☆28Updated 5 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60Updated 9 years ago
- Unix remote-shell backdoor develop with Bash, Netcat, OpenSSL (data encryption with AES-128bit)☆25Updated 7 years ago
- A Linux Kernel Module that adds a backdoor to your system☆39Updated 15 years ago
- Fuzzbunch Python-Wine wrapper☆57Updated 7 years ago
- Inject beef hooks into HTTP traffic and track hooked systems from cmdline☆121Updated 9 years ago
- POC of code that downloads and executes shellcode in memory.☆80Updated 10 years ago
- Remote Windows shell☆31Updated 10 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- Mailing Phishing Framework - This Branch is UNSTABLE :: Official STABLE master branch at https://github.com/Section9Labs/Cartero☆48Updated 7 years ago
- Slides from previous conference talks☆41Updated 7 years ago
- rant blog about CryptoTrooper ransomware, its history, legacy and MalwareTech case☆12Updated 6 years ago
- Cross Distribution Exploit Testing☆27Updated 9 years ago
- PowerShell module for the exploitation and testing☆16Updated 9 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Updated 8 years ago
- A curated list of rootkits found on Github and other sites.☆62Updated 7 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Updated 6 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- ssh session type for metasploit☆98Updated 2 years ago
- WeakNet PHP Execution Shell☆31Updated 9 years ago