sergiLopez / Flanders-TrojanView external linksLinks
Trojan written in C++ for Windows
☆20Mar 12, 2024Updated last year
Alternatives and similar repositories for Flanders-Trojan
Users that are interested in Flanders-Trojan are comparing it to the libraries listed below
Sorting:
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆13Jun 2, 2024Updated last year
- ☆11Aug 25, 2023Updated 2 years ago
- ☆13Sep 8, 2024Updated last year
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- web based c2 🏴☠️☆15Aug 10, 2024Updated last year
- Red Team list and cheat sheets☆11Jul 7, 2024Updated last year
- Malware campaigns and APTs research by BlackArrow☆19Apr 30, 2020Updated 5 years ago
- AzureAD Pentest☆25Mar 24, 2022Updated 3 years ago
- razorAP, Bash and Python tool used to generate Fake Access Points for Wi-Fi networks with 802.1X authentication.☆22Sep 18, 2024Updated last year
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Jun 22, 2023Updated 2 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- This repo for Windows x32-x64 Kernel/User Mode Exploitation writeups and exploits☆24Oct 20, 2025Updated 3 months ago
- C\C++ Ransomware example using RSA and AES-128 with BCrypt library on Windows☆19Jan 3, 2023Updated 3 years ago
- A C ransomware(educational only)☆22Feb 3, 2022Updated 4 years ago
- A python trojan with spyware, info stealing and ransomware abilities.☆33Sep 12, 2025Updated 5 months ago
- my own 2fa bypass methodolgy☆27Sep 22, 2023Updated 2 years ago
- 地狱犬系统:无埋点、自动织入插桩,用于监控Andorid系统中各种行为,包括页面、控件、以及方法(函数)、指令级别的劫持和注入,实现监控☆10May 12, 2021Updated 4 years ago
- The Swiss army knife of evasion tool that bypasses AMSI, Applocker, and CLM mode simultaneously.☆26Mar 9, 2024Updated last year
- This is my custom wordlist for WiFi passwords, tailored specifically for WiFi networks in Indonesia.☆13Nov 29, 2025Updated 2 months ago
- A powerful Discord RAT for remote control & monitoring. Capture screenshots, grab passwords, evade detection.☆11Sep 28, 2025Updated 4 months ago
- Computer Engineering Personal Resources☆15Feb 2, 2026Updated last week
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- Windows Signature Thief is a program designed to steal the digital signature of one file and install it on another.☆21Dec 9, 2025Updated 2 months ago
- Online Judge that accepts a solution and judges it as Accepted, Compilation Error, Runtime Error, Time Limit Exceeded or Wrong Answer.☆14Mar 10, 2023Updated 2 years ago
- Header only library for obfuscation import winapi functions.☆43Feb 12, 2025Updated last year
- xsschecker tests endpoints for reflected XSS by injecting payloads and checking responses. It prints vulnerable if the payload is reflect…☆36Nov 3, 2025Updated 3 months ago
- A slightly more fun way to disable windows defender☆52May 4, 2025Updated 9 months ago
- Simple ransomware to troll your friends. Encrypt and Decrypt a Windows computer using a simple xor encryption which is pretty basic!☆33Jan 10, 2021Updated 5 years ago
- ☆86Aug 18, 2022Updated 3 years ago
- It is a ML based project developed in python language. It detect and recognize the face and mark attendance of that person. It's good poi…☆10Aug 13, 2023Updated 2 years ago
- ☆14May 14, 2022Updated 3 years ago
- DotRat is a Telegram Rat which includes good features and non privileged persistence. Written in C#☆12Aug 14, 2023Updated 2 years ago
- SSH brute-forcing tool written in python☆15Feb 10, 2023Updated 3 years ago
- p2p金融借贷网站项目☆12May 11, 2018Updated 7 years ago
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago
- ☆25Nov 30, 2025Updated 2 months ago
- 递归寻找JS泄露的路径。Recursively search for the paths of JS Files.For pentest☆11Sep 30, 2024Updated last year
- Pockr Asset Management 破壳资产管理工具☆11Dec 8, 2022Updated 3 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago