WHMCS for Monero
☆15Aug 9, 2022Updated 3 years ago
Alternatives and similar repositories for monerowhmcs
Users that are interested in monerowhmcs are comparing it to the libraries listed below
Sorting:
- ☆17Oct 26, 2018Updated 7 years ago
- C# web scraper which targets chaturbate.com☆12Sep 14, 2018Updated 7 years ago
- A quick String < - > HEX tool for Windows with Drag & Drop and File saving☆11Dec 4, 2018Updated 7 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- A simplex kernel-based keylogger written for fun, not evil.☆16Apr 3, 2018Updated 7 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- A TCP-Client connected Keylogger in C#☆12Mar 14, 2017Updated 8 years ago
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- 大学毕业设计,远程控制工具集,包含远程命令行,远程文件管理,远程桌面,已停止维护。☆14Dec 27, 2015Updated 10 years ago
- A tool for fuzzing for ports that allow outgoing connections☆17Oct 15, 2018Updated 7 years ago
- VNC_Proxy / Repeater☆20Oct 14, 2014Updated 11 years ago
- Trojan downloader simple virus☆16Sep 30, 2018Updated 7 years ago
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Feb 1, 2026Updated last month
- XMR Integration / Demo☆35Apr 1, 2017Updated 8 years ago
- rdp2tcp is a tunneling tool on top of remote desktop protocol (RDP). It uses RDP virtual channel capabilities to multiplex several ports …☆41Jun 26, 2017Updated 8 years ago
- Reverse shell and rootkit☆19Apr 28, 2017Updated 8 years ago
- ZeroRemote Trojan SRC Extract☆19Mar 1, 2017Updated 9 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆51Jun 8, 2019Updated 6 years ago
- A simple reflective dll example☆19Jan 8, 2017Updated 9 years ago
- an RCE (remote command execution) approach of CVE-2018-7750☆21Nov 6, 2018Updated 7 years ago
- LD_PRELOAD rootkit☆24Oct 12, 2014Updated 11 years ago
- Multi source CVE/exploit parser.☆27Aug 30, 2017Updated 8 years ago
- a very basic proxy obfuscator based on dnlib☆21Jul 3, 2018Updated 7 years ago
- Proof of Concepts, Exploits☆28Apr 8, 2025Updated 10 months ago
- a small tool for auditting weak ssh password☆23Feb 24, 2018Updated 8 years ago
- VNC pentest tool with bruteforce and ducky script execution features☆24Nov 18, 2017Updated 8 years ago
- cobalt strike stuff I have gathered from around github☆31May 5, 2017Updated 8 years ago
- Battery Plugin for Xamarin and Windows☆27Apr 3, 2023Updated 2 years ago
- Capturing audio (.wav) from target using a link☆12Feb 21, 2020Updated 6 years ago
- Reverse shell for remote administration☆29Feb 12, 2018Updated 8 years ago
- SkyRAT - Powershell Remote Administration Tool☆34Jan 8, 2018Updated 8 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Jul 31, 2018Updated 7 years ago
- VK bot для сноса бесед☆11Feb 7, 2021Updated 5 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Decompiled source code of GhostCtrl. It’s not the original source code☆10Jul 26, 2017Updated 8 years ago
- ☆10Sep 24, 2021Updated 4 years ago
- A small two-file JSON serializer in C# that works on MonoDroid/MonoTouch☆11Jun 25, 2019Updated 6 years ago
- A PHP library for the Monero simplewallet JSON-RPC interface.☆30Apr 2, 2019Updated 6 years ago
- Raw socket library/framework for red team events☆33Feb 25, 2023Updated 3 years ago