☆43Jun 18, 2024Updated last year
Alternatives and similar repositories for TrojanFactory
Users that are interested in TrojanFactory are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A small clone of 1024 (https://play.google.com/store/apps/details?id=com.veewo.a1024)☆19Nov 1, 2018Updated 7 years ago
- ☆14Feb 17, 2022Updated 4 years ago
- ☆14Nov 28, 2023Updated 2 years ago
- Türk kullanıcıların parola seçimlerinin analizi için yapılmış bir çalışmadır☆73Apr 23, 2021Updated 4 years ago
- ☆10Dec 9, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Beef Over AWS is a tool that allows you to use Beef-XSS over WAN securly and anonymously.☆39Oct 4, 2021Updated 4 years ago
- ☆10Mar 27, 2024Updated last year
- "Socialx" is a Social Engineering And Remote Access Trojan Tool. You can generate fud backdoor and you can embed any file you want inside…☆325Jun 28, 2021Updated 4 years ago
- OWASP Juice Shop: Probably the most modern and sophisticated insecure web application☆14Jan 12, 2023Updated 3 years ago
- A Telegram bot that verifies if your credit card is public via antipublic.cc api☆10Sep 27, 2025Updated 6 months ago
- ☆20Jan 30, 2022Updated 4 years ago
- Türk kullanıcıların parola seçimlerinin analizi için yapılmış bir çalışmadır☆841Sep 12, 2023Updated 2 years ago
- ☆11Nov 5, 2025Updated 4 months ago
- ☆22May 25, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆29Apr 8, 2019Updated 6 years ago
- A list of resources for those interested in getting started in bug bounties☆107May 18, 2020Updated 5 years ago
- This is a read-only mirror of the CRAN R package repository. DMwR — Functions and data for "Data Mining with R"☆10Mar 13, 2017Updated 9 years ago
- ☆28Jan 1, 2020Updated 6 years ago
- ☆18Mar 19, 2023Updated 3 years ago
- A Telegram bot to scrape credit card numbers, stripe secret keys from telegram chats.☆14Sep 24, 2023Updated 2 years ago
- ☆15Mar 26, 2023Updated 3 years ago
- ☆11May 7, 2022Updated 3 years ago
- ☆21Mar 18, 2023Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆14Mar 12, 2023Updated 3 years ago
- 🔒Siber güvenliği ve gizliliği korumaya yönelik 300'den fazla ipucundan oluşan derlenmiş bir kontrol listesi☆17May 19, 2023Updated 2 years ago
- ☆62Jul 9, 2019Updated 6 years ago
- ☆41Jun 15, 2024Updated last year
- HackingNotes☆19Nov 1, 2023Updated 2 years ago
- ☆11Jul 12, 2019Updated 6 years ago
- BIL206U☆14Apr 28, 2025Updated 10 months ago
- It is a greencheap theme pack.☆23Jul 28, 2021Updated 4 years ago
- A PoC of CVE-2025-24071 / CVE-2025-24054, A windows vulnerability that allow get NTMLv2 hashes☆25May 15, 2025Updated 10 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Udemy Course Repository☆22Apr 28, 2023Updated 2 years ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆14Mar 31, 2020Updated 5 years ago
- ☆18Apr 4, 2023Updated 2 years ago
- ☆12May 27, 2021Updated 4 years ago
- R Program Challenges for my Essex graduate summer school course and my University of Michigan undergraduate data science course.☆17Mar 18, 2026Updated last week
- ☆10Feb 1, 2022Updated 4 years ago
- ☆10Jul 12, 2019Updated 6 years ago