đ Help find Trojan Source vulnerability in code đ . Useful for code review in project with multiple collaborators (CI/CD)
â47Dec 6, 2023Updated 2 years ago
Alternatives and similar repositories for TrojanSourceFinder
Users that are interested in TrojanSourceFinder are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.â120Jul 6, 2024Updated last year
- Tool scan EternalBlue by golangâ21Sep 13, 2019Updated 6 years ago
- Windows Syslog Command Line Clientâ15Nov 21, 2012Updated 13 years ago
- Windows API/constants, identity, and WinHTTP/WinINet for Go.â19Mar 6, 2026Updated 2 weeks ago
- çťčż360ăçŤçťçĺŽĺ ¨čŽžĺ¤ćŚćŞćˇťĺ ç¨ćˇâ15Feb 15, 2022Updated 4 years ago
- IoT Malware Similarity Analysis Platformâ45Jan 30, 2022Updated 4 years ago
- Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3â12Dec 17, 2021Updated 4 years ago
- Browser-based QRLJacking tool written in pure JavaScript. For educational use only.â17Sep 13, 2024Updated last year
- A simple shell code encryptor/decryptor/executor to bypass anti virus.â469Dec 13, 2021Updated 4 years ago
- Script to automate PUT HTTP method exploitation to get shellâ125Jun 25, 2020Updated 5 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.â58Aug 6, 2020Updated 5 years ago
- Just a PoC to turn xlsx (regular Excel files) into xlsm (Excel file with macro) and slipping inside a macro (vbaProject.bin)â145Sep 4, 2021Updated 4 years ago
- This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification.â280Aug 4, 2021Updated 4 years ago
- Yet another content discovery toolâ119Nov 16, 2024Updated last year
- â11Dec 1, 2021Updated 4 years ago
- Open source Java Card applet that allows you to unlock, start, or lock a Tesla Model 3 just like the official key cardâ15Oct 19, 2025Updated 5 months ago
- A TCP-Client connected Keylogger in C#â12Mar 14, 2017Updated 9 years ago
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.â179Nov 25, 2022Updated 3 years ago
- SSH password crack for penetration tests using brute force and dictionary attacks.â13Dec 19, 2025Updated 3 months ago
- Router socks. One port socks for all the others.â69May 22, 2024Updated last year
- The best way to send emails in Go.â12Feb 4, 2021Updated 5 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagementâ66Apr 10, 2022Updated 3 years ago
- Repository for the SecurityTube Linux Assembly Expert Certificationâ10Oct 11, 2017Updated 8 years ago
- A Zeek package to detect CVE-2021-42292, a Microsoft Excel local privilege escalation exploit.â18Nov 11, 2021Updated 4 years ago
- uuid-shellcode-executionâ13May 9, 2021Updated 4 years ago
- With the help of this automated script, you will never lose track of recently released CVEs.â52Feb 19, 2022Updated 4 years ago
- PoC code from blogâ16Mar 10, 2020Updated 6 years ago
- Backstage Parserâ33Jun 23, 2022Updated 3 years ago
- Unicode encoding attacks with machine learningâ98Nov 25, 2021Updated 4 years ago
- Convert shellcode into different formats!â357Jan 24, 2023Updated 3 years ago
- Linux startup analyzerâ66Jun 2, 2025Updated 9 months ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.â124Mar 18, 2023Updated 3 years ago
- â89Feb 11, 2022Updated 4 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methodsâ14Sep 30, 2022Updated 3 years ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)â30Feb 4, 2022Updated 4 years ago
- This repository is related to specialized books published by the THB team.â20Aug 13, 2025Updated 7 months ago
- AD Pentest Cheatsheet by BlackWaspâ23Oct 10, 2022Updated 3 years ago
- Windows NTLM Authentication Backdoorâ241Jan 15, 2025Updated last year
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of âŚâ76Nov 19, 2024Updated last year