Trojan written in C++ for Windows
☆20Mar 12, 2024Updated 2 years ago
Alternatives and similar repositories for Flanders-Trojan
Users that are interested in Flanders-Trojan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Computer Engineering Personal Resources☆16Feb 2, 2026Updated 3 months ago
- Personal dotFiles with an installer to speed up your setup.☆18May 31, 2024Updated last year
- ☆13Sep 8, 2024Updated last year
- A simple script to automate a youtube chanel☆16Apr 12, 2022Updated 4 years ago
- Tool to retrieve Config from Redline C2 servers☆16Mar 14, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- ☆13Nov 21, 2020Updated 5 years ago
- Source code for HappyHack☆12May 26, 2019Updated 6 years ago
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆14Jun 2, 2024Updated last year
- Header only library for obfuscation import winapi functions.☆43Feb 12, 2025Updated last year
- ☆14Aug 25, 2023Updated 2 years ago
- A MMORPG KIT's MMO server project written by using .NET8☆25Apr 14, 2026Updated 3 weeks ago
- Removed Ads + Discord Rpc. All by me☆38Apr 20, 2025Updated last year
- ☆14Mar 25, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Attack tool for altering packed samples so that they evade static packing detection☆22Jan 26, 2025Updated last year
- Red Team list and cheat sheets☆11Jul 7, 2024Updated last year
- C\C++ Ransomware example using RSA and AES-128 with BCrypt library on Windows☆20Jan 3, 2023Updated 3 years ago
- A powerful Discord RAT for remote control & monitoring. Capture screenshots, grab passwords, evade detection.☆13Sep 28, 2025Updated 7 months ago
- Malware campaigns and APTs research by BlackArrow☆19Apr 30, 2020Updated 6 years ago
- Open Source MMO Framework World of Warcraft - Legion - 7.3.5.26972 with PlayerBots☆35Updated this week
- A C ransomware(educational only)☆22Feb 3, 2022Updated 4 years ago
- web based c2 🏴☠️☆15Aug 10, 2024Updated last year
- Convert Python Code To C++ Code☆16Apr 11, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- List of extensions and plugins for MMORPG KIT projects☆17Sep 10, 2022Updated 3 years ago
- Obsidian Markdown Cybersecurity Notes☆31Jan 4, 2026Updated 4 months ago
- CellOS LV-1 Reverse Engineering☆24Mar 19, 2016Updated 10 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- MMORPG server used in my unity3d projects☆25Jul 16, 2025Updated 9 months ago
- AzureAD Pentest☆25Mar 24, 2022Updated 4 years ago
- This repo for Windows x32-x64 Kernel/User Mode Exploitation writeups and exploits☆24Oct 20, 2025Updated 6 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- GENERATE PYTHON BASED FUD STUB☆21Nov 20, 2023Updated 2 years ago
- Remotely collect linux live forensics artifacts.☆14Jul 8, 2022Updated 3 years ago
- A minimal SOCKS5 proxy written in C.☆12Mar 8, 2021Updated 5 years ago
- ☆12Oct 31, 2022Updated 3 years ago
- razorAP, Bash and Python tool used to generate Fake Access Points for Wi-Fi networks with 802.1X authentication.☆22Sep 18, 2024Updated last year
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Jun 22, 2023Updated 2 years ago
- DotRat is a Telegram Rat which includes good features and non privileged persistence. Written in C#☆12Aug 14, 2023Updated 2 years ago