ineseterna / tochka
☆11Updated 6 years ago
Alternatives and similar repositories for tochka:
Users that are interested in tochka are comparing it to the libraries listed below
- CPU Miner monero☆46Updated 6 years ago
- A Linux Cyptomining malware☆36Updated last year
- Contact Telegram : https://t.me/hakanonymos☆51Updated 9 months ago
- JS Jscript - download file from url then run it☆59Updated 4 years ago
- A Build Your Own Botnet Project Build For People Who Wanna Hijack Peoples Computers And Control Them With Over 300 Features!☆11Updated 5 years ago
- Download payload to disk and install it to startup then melt.☆35Updated 5 years ago
- ☆15Updated 3 years ago
- Silent file loader☆14Updated 2 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆26Updated 7 years ago
- Browser and apps data stealer☆23Updated last year
- Inject Metasploit Shell Code in Legitimate Process☆11Updated 4 years ago
- Open-source windows ransomware created for educational purposes☆21Updated 4 years ago
- This script make any windows compatible with RDP connection☆18Updated last month
- TeleShadow - Telegram Desktop Session Stealer (Windows)☆111Updated 6 years ago
- ☆14Updated last year
- Using bitsadmin to download our malware and to bypass defender☆27Updated 3 years ago
- Batch NetWork Worm with Download & Execute Payload☆12Updated 4 years ago
- Javascript Botnet☆23Updated 6 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 7 years ago
- Simple class to search and upload files☆27Updated 5 years ago
- A Simple XMR(Monero) and ETH(Ethereum) Miner written in python☆7Updated 4 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆24Updated 4 years ago
- Simple example of how to remove all malwares from disk and registry.☆40Updated 5 years ago
- A javascript based botnet/C&C to remotely manage/control browsers.☆24Updated 3 years ago
- ransomware chiffre tous les fichiers,télécharge une image depuis un serveur distant puis change le fond d'ecran après le chiffrement des …☆25Updated 4 years ago
- This application was created as a POC for how to scan your local network traffic for HTTP requests and then inject various javascript cry…☆77Updated 4 years ago
- ☣️ Necro Stealer + Web Panel☆10Updated 4 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆33Updated 8 years ago
- Simple way to read wirte delete values from registry☆18Updated 5 years ago
- DarkRats Standalone HVNC☆24Updated 2 years ago