dialex / PersonalTrollerLinks
Personal Troller is a C# console application to torment your friends' work day.
β11Updated 7 years ago
Alternatives and similar repositories for PersonalTroller
Users that are interested in PersonalTroller are comparing it to the libraries listed below
Sorting:
- Simple backdoor for public places, that uses a file system for communication. Just for fun! πβ55Updated 5 years ago
- This tool audits a website before hand and can exploit vulnerabilities if the website scanned has any.β14Updated 12 years ago
- Shellcode / Buffer Overflow π£β20Updated 5 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.β16Updated 11 years ago
- arp-poison (aka arp spoof) toolβ41Updated 12 years ago
- Discord botnet bot written in pythonβ10Updated 8 years ago
- Agent Tesla Spyware C2 Exploit [PATCHED]β31Updated 7 years ago
- AES Ransomware in batchβ11Updated last year
- A simple and cross-platform Remote Administration Tool written in Rubyβ16Updated 7 years ago
- A simple SMTP Mass mailer program utilising open relays.β10Updated 9 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.β15Updated 3 years ago
- transparent TCP-to-proxy redirectorβ15Updated 5 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Managerβ¦β60Updated 7 years ago
- Binds two files together and updates the stub accordingly. The stub will then drop and execute both files.β15Updated 9 years ago
- A PS forensics tool for Scraping, Filtering and Exporting Windows Event Logsβ16Updated 6 years ago
- Password Recovery Toolkit For Windows Written in Python 3β26Updated last year
- A RAT, script that controls other pcs remotly, for educational purposes onlyβ13Updated last year
- A Linux Cyptomining malwareβ36Updated 2 years ago
- Icon Changer, File Pumper & Extension Spoofer - Quickly Modify Executable Filesβ68Updated 7 years ago
- Use Invoke-PSImage to deliver a payload in an Imageβ52Updated 7 years ago
- Graphical user interface for the windows version of THC Hydraβ53Updated 7 years ago
- Collection of cracked malwareβ15Updated 6 years ago
- Facebook phishing pageβ10Updated 4 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Useβ¦β18Updated 7 years ago
- Plog - A simple and powerful keylogger !β11Updated 7 years ago
- Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3β13Updated 3 years ago
- Exploitation Tool For Windows Using Batch and Powershellβ22Updated 9 months ago
- CryptoTrojan in Python (For educational purpose ONLY)β50Updated 7 years ago
- Disabling Windows Defender & downloading payloadβ21Updated 5 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.β26Updated 8 years ago