air01a / trojanLinks
Home made trojan (c/c++)
☆11Updated 2 years ago
Alternatives and similar repositories for trojan
Users that are interested in trojan are comparing it to the libraries listed below
Sorting:
- Small Backdoor/rootkit for linux kernel☆21Updated 11 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆59Updated 9 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 9 years ago
- Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but e…☆41Updated 3 years ago
- Slides from previous conference talks☆41Updated 8 years ago
- LNHG - Mass Web Fingerprinter☆61Updated 9 years ago
- Fuzzbunch Python-Wine wrapper☆57Updated 8 years ago
- Multi-threaded SSH Password Auditor☆93Updated 11 years ago
- ☆31Updated 9 years ago
- Automatic backdooring apk with meterpreter (PoC)☆51Updated 8 years ago
- OpenSSL Heartbleed (CVE-2014-0160) vulnerability scanner, data miner and RSA key-restore tools.☆98Updated 11 years ago
- ☆85Updated last year
- POC of code that downloads and executes shellcode in memory.☆80Updated 11 years ago
- pwning & info gathering via user browser☆39Updated 10 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Updated 7 years ago
- A curated list of rootkits found on Github and other sites.☆62Updated 8 years ago
- ☆34Updated 8 years ago
- WeakNet PHP Execution Shell☆31Updated 9 years ago
- XSS Tunnel is a standard HTTP proxy which sits on an attacker’s system. XSS Shell is a powerful XSS backdoor, in XSS Shell one can inter…☆88Updated 10 years ago
- Multi theaded DNS bruteforcing☆13Updated 11 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆59Updated 10 years ago
- cross site scripting framework plugin for metasploit☆17Updated 12 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- A python based https remote access trojan for penetration testing☆84Updated 9 years ago
- Projects and POCs☆60Updated 10 years ago
- Exploits used on hacking CTF's☆28Updated 5 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- ☆74Updated 2 years ago
- A modular distributed penetration testing tool.☆41Updated 8 years ago
- CVE-2017-11882 File Generator PoC☆35Updated 7 years ago