Exploit for the vulnerability null pointer derefrence to in XWorm RAT
☆19Mar 1, 2026Updated last month
Alternatives and similar repositories for XWorm-Trojan
Users that are interested in XWorm-Trojan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Keylogger builder written in C#☆11Jul 13, 2022Updated 3 years ago
- first program python to steal password microsoft edge all version browser, send info to email☆13Feb 11, 2021Updated 5 years ago
- ☆12Oct 20, 2018Updated 7 years ago
- ☆14Aug 30, 2024Updated last year
- BitRat 1.39 Cracked & Offline Builder☆11Mar 5, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆13Sep 26, 2020Updated 5 years ago
- Nj RAT Stub☆14Dec 24, 2016Updated 9 years ago
- Fully Undetected Grabber (Grabs Wallets, Passwords, Cookies, Autofills, Information, Discord, Telegram)☆20Apr 8, 2024Updated 2 years ago
- FEBREV venom is a RAT generator tool to create Android RATs through metasploit , signs the RAT apk , and sends the RAT apk to the victim…☆16Aug 13, 2019Updated 6 years ago
- This is the published source code from the Worm Locker2.0 ransomware. Please open the README file in a zip file for more information.☆14Dec 18, 2020Updated 5 years ago
- GitHub Is the HOME ! 🔱 We believe in God, everyone else is suspicious 🔱☆28Mar 20, 2026Updated 3 weeks ago
- Trojan Rat Builder(348), Ransomware Builder(17), Crypter(110), Miner(9), Worm(8), Botnet(49), Virus Builder(62), Binder(35), Exploit(42),…☆21Mar 29, 2022Updated 4 years ago
- Search Termux Commands and Guide in Termux !!☆12Updated this week
- rootkit that wait user to copy a bitcoin adress then change it with the attacker adress when the victim paste it☆13Oct 25, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Hex encode & decode a string, right from your terminal.☆10Jan 5, 2023Updated 3 years ago
- Please. Do not run this file on your or another computer !!! Use this file for educational purposes only !!! I am not responsible for the…☆13Dec 17, 2020Updated 5 years ago
- This is my ransomware from my video: https://www.youtube.com/watch?v=niRclD6ewXA&t=11s&ab_channel=CYBERSOLDIER☆18Apr 12, 2022Updated 4 years ago
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago
- Baseline/Test for persistence in common Windows Registry locations☆23Jan 30, 2019Updated 7 years ago
- Smart pentesting toolkit for modern WPA/WPA2 networks ⚔️📡☆28Jun 19, 2020Updated 5 years ago
- C# stealer Chrome, Opera, Chromium ,Edge ,Firefox, IE , Outlook passwords, cookies , bookmarks , autofill , desktop files , wallets☆25Nov 25, 2024Updated last year
- CVE-2023-43261 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption☆57Oct 1, 2023Updated 2 years ago
- Simple C++ cryptolocker Blowfish CBC☆18Apr 13, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Chocolatey 'docker' package☆12Jan 21, 2019Updated 7 years ago
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- ☆10Mar 2, 2023Updated 3 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- ☆13Jun 26, 2022Updated 3 years ago
- Various exploits☆10Apr 27, 2017Updated 8 years ago
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago
- Make it easier to find problem devices on your computer and find the corresponding driver.☆11Sep 18, 2018Updated 7 years ago
- Word counting made easy. Retrieve the number of words in a string or stdin.☆10Jan 5, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Aug 22, 2023Updated 2 years ago
- Detect the possible hash-types corresponding to a string, right from your terminal.☆11Jan 5, 2023Updated 3 years ago
- The Hunt for Malicious Strings☆13Oct 8, 2020Updated 5 years ago
- Tesla Hack All Vehicles DoS Infotainment Touchscreen Interface CVE-2020-10558☆14Feb 23, 2026Updated last month
- Code and notes regarding Malware Development☆11Oct 30, 2022Updated 3 years ago
- hook detector using emulation and comparing static with dynamic outputs☆17Aug 11, 2023Updated 2 years ago
- Juice Jacking / Automatic Android Rooting based on Intel Edison using dirty c0w☆11Nov 16, 2016Updated 9 years ago