mtrojnar / torgetLinks
Fast large file downloader over Tor
☆36Updated last year
Alternatives and similar repositories for torget
Users that are interested in torget are comparing it to the libraries listed below
Sorting:
- Yandex browser passwords and credit-cards decryption algorithm☆22Updated 10 months ago
- A command and control framework.☆54Updated last year
- Download utility for Tor☆56Updated 2 years ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆131Updated 9 months ago
- ☆57Updated 2 years ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆46Updated 9 months ago
- Inject shellcode into a valid BMP/GIF image.☆34Updated 5 years ago
- C2 writen in Rust & Go powered by Tor network.☆154Updated 3 months ago
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆81Updated 7 months ago
- AV/EDR processes termination by exploiting a vulnerable driver (BYOVD)☆176Updated 2 weeks ago
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆28Updated 9 months ago
- The best powershell obfuscator ever made☆120Updated 6 months ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆99Updated 11 months ago
- Keklick - C2 Hunting, Reporting and Visualization Tool☆63Updated 6 months ago
- Cross-platform post-exploitation HTTP Command & Control agent written in golang☆112Updated 9 months ago
- A simple go Proof of Concept to start a new shell as TrustedInstaller☆63Updated 2 years ago
- a small wiper malware programmed in c#☆59Updated 3 years ago
- Advanced dynamic malware analysis tool.☆82Updated 2 years ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆60Updated 9 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆86Updated 11 months ago
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆88Updated 11 months ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆75Updated last year
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆44Updated 2 years ago
- PandaCrypter is a C#-based tool designed to convert PowerShell scripts into obfuscated batch files (.bat) with encryption and additional …☆44Updated 5 months ago
- Ransomware written in go, encrypt - decrypt.☆29Updated 9 months ago
- x86-64 Malware Crypter built in Rust for Windows with Anti-VM, powered by memexec☆108Updated last year
- Antivirus Signature Search Toolkit☆81Updated 2 years ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆72Updated last year
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆112Updated 2 years ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆133Updated last year