sqrtZeroKnowledge / XWorm-TrojanLinks
Exploit for the vulnerability null pointer derefrence to in XWorm RAT
☆11Updated 2 months ago
Alternatives and similar repositories for XWorm-Trojan
Users that are interested in XWorm-Trojan are comparing it to the libraries listed below
Sorting:
- Malware Libraries focused in help Malware Development☆23Updated 2 years ago
- Spider or repeater to find all links.☆13Updated 4 years ago
- Homo Network - The best ddos botnet in 2023☆10Updated 2 years ago
- this tool only for educational purpose . Disclaimer: We are no responsibility any action . if you want you use for educational purpose …☆8Updated 5 years ago
- .vbs script to deliver payload with persistence.☆8Updated 5 years ago
- Some stealers in one. Simple to use.☆6Updated 4 years ago
- fully Undetectable payload generator for metasploit☆11Updated 2 years ago
- web based c2 🏴☠️☆13Updated 9 months ago
- TCP Data Transfer Tool By ClumsyLulz☆12Updated 2 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 5 years ago
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆12Updated 2 years ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- Automate Blind SQL Injection with Python.☆22Updated 2 years ago
- Complete and modifyable ransomware program☆11Updated 4 years ago
- ☆10Updated 9 months ago
- This is a Simple reg Backdoor for Windows shell Hacking. You can fully compromise the target machine with this TOOL . For Advance backdoo…☆13Updated 4 years ago
- ☆11Updated 2 years ago
- Python Reverse Shell Builder with some advanced functionalities☆12Updated 4 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Updated last year
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- ☆10Updated 6 months ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 3 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆15Updated 4 years ago
- Sources Codes of many Office Malwares☆16Updated 2 years ago
- This repository will present all Information interest about Thanatos Ransomware after analysis☆8Updated 6 years ago
- Recon-ng modules for basic OSINT.☆11Updated 3 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Machine Learning basics with phishing dataset☆11Updated 4 years ago
- Trojan written in C++ for Windows☆18Updated last year