mtrojnar / torgetLinks
Fast large file downloader over Tor
☆36Updated last year
Alternatives and similar repositories for torget
Users that are interested in torget are comparing it to the libraries listed below
Sorting:
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆28Updated 9 months ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆133Updated last year
- A command and control framework.☆54Updated last year
- ☆57Updated 2 years ago
- The best powershell obfuscator ever made☆119Updated 6 months ago
- Youtube as C2 channel - Control Windows systems uploading QR videos to Youtube☆97Updated last year
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆137Updated 9 months ago
- Modern Cross-Platform Peer-to-Peer Botnet over TOR☆47Updated 3 years ago
- Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠☆117Updated last week
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆59Updated 9 months ago
- x86-64 Malware Crypter built in Rust for Windows with Anti-VM, powered by memexec☆107Updated last year
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆99Updated 11 months ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆46Updated 9 months ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆130Updated 9 months ago
- ☆51Updated 4 months ago
- Keklick - C2 Hunting, Reporting and Visualization Tool☆63Updated 6 months ago
- Inject shellcode into a valid BMP/GIF image.☆34Updated 5 years ago
- C2 writen in Rust & Go powered by Tor network.☆155Updated 3 months ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆105Updated 3 years ago
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆81Updated 7 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 10 months ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆142Updated last year
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆75Updated last year
- Yandex browser passwords and credit-cards decryption algorithm☆22Updated 9 months ago
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆88Updated 11 months ago
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆44Updated 2 years ago
- Cross-platform post-exploitation HTTP Command & Control agent written in golang☆111Updated 9 months ago
- Ransomware written in go, encrypt - decrypt.☆29Updated 9 months ago
- BrowserSnatch is a powerful browser stealer or browser data extraction tool intended to be used for ethical hacking or penetration testin…☆296Updated 2 months ago
- A robust Windows Process Executable Packer and Launcher implementation written in Rust for Windows x64 systems.☆40Updated last year