mtrojnar / torgetLinks
Fast large file downloader over Tor
☆36Updated last year
Alternatives and similar repositories for torget
Users that are interested in torget are comparing it to the libraries listed below
Sorting:
- macos stealer poc☆133Updated 5 months ago
- Download utility for Tor☆56Updated 2 years ago
- The best powershell obfuscator ever made☆120Updated 4 months ago
- x86-64 Malware Crypter built in Rust for Windows with Anti-VM, powered by memexec☆106Updated last year
- Modern Cross-Platform Peer-to-Peer Botnet over TOR☆49Updated 3 years ago
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆44Updated 2 years ago
- Advanced dynamic malware analysis tool.☆82Updated last year
- A command and control framework.☆55Updated 11 months ago
- Inject shellcode into a valid BMP/GIF image.☆32Updated 5 years ago
- a small wiper malware programmed in c#☆59Updated 3 years ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆87Updated 9 months ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆135Updated last year
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆27Updated 8 months ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆73Updated last year
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆34Updated 3 years ago
- DNS over HTTPS targeted malware (only runs once)☆96Updated 2 years ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆99Updated last year
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆46Updated 7 months ago
- Google Chrome Cookies Stealer. Steals Chrome cookies☆47Updated 2 years ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆27Updated last year
- A simple go Proof of Concept to start a new shell as TrustedInstaller☆62Updated 2 years ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆94Updated 10 months ago
- C2 writen in Rust & Go powered by Tor network.☆150Updated last month
- This repository is a tool to create a .suo that when run by visual studio's will achieve code execution☆110Updated 2 years ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆112Updated 2 years ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆130Updated 8 months ago
- Antivirus Signature Search Toolkit☆82Updated 2 years ago
- Youtube as C2 channel - Control Windows systems uploading QR videos to Youtube☆97Updated last year
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆47Updated 4 months ago
- ☆57Updated 2 years ago