A large collection of Troajn
☆36Aug 26, 2022Updated 3 years ago
Alternatives and similar repositories for A-large-collection-of-Trojan
Users that are interested in A-large-collection-of-Trojan are comparing it to the libraries listed below
Sorting:
- A Multilayered AV/EDR Evasion Framework and AV Testing Tool.☆18Jun 28, 2025Updated 8 months ago
- Beacon Object File implementation of Yaxser's Backstab☆15Mar 9, 2022Updated 4 years ago
- Convert Any Exe to Bin (Base64 Output or Binary)☆21Jun 19, 2020Updated 5 years ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆27Nov 20, 2024Updated last year
- Some of my custom "tools".☆28Feb 21, 2022Updated 4 years ago
- OsintifyX: Powerful Open-source OSINT tool for extracting valuable information from Instagram profiles. OSINT: Instagram Forensics Tool☆11Feb 19, 2024Updated 2 years ago
- RtspBruter is a RTSP(Real Time Streaming Protocol) brute☆34Apr 27, 2020Updated 5 years ago
- A small (Edited) POC to make defender useless by removing its token privileges and lowering the token integrity☆32Jun 28, 2022Updated 3 years ago
- This sample shows how to uninstall and hide apps programmatically☆12Dec 4, 2019Updated 6 years ago
- ☆13Jun 29, 2023Updated 2 years ago
- Discover Non-Discoverable Bluetooth Classic devices☆13Oct 10, 2024Updated last year
- Auto exploitation tool for CVE-2024-24401.☆36Sep 7, 2024Updated last year
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- Generator userbars Warface☆13Dec 31, 2023Updated 2 years ago
- this project can extract contact email address from many site.☆12Sep 26, 2021Updated 4 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- A repository holding Proof of Concepts for executing the calculator application via different file formats☆42Jun 27, 2024Updated last year
- Build wordlists from the common-crawl index☆12Oct 9, 2022Updated 3 years ago
- Simple python3 script to automate CVE-2018-9995☆11Feb 20, 2024Updated 2 years ago
- EWDK C++ toolchain for bazel☆12Feb 1, 2026Updated last month
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- Simple KDMapper driver dumper. Unlike other dumpers, this dumper dumps the PE headers of the image too.☆17May 10, 2024Updated last year
- Simple tool to view all passwords of WiFi networks saved in Windows☆12Sep 7, 2025Updated 6 months ago
- ☆14Apr 6, 2025Updated 11 months ago
- Expeditus is a loader that executes shellcode on a target Windows system. It combines several offensive techniques in order to attempt to…☆13May 30, 2022Updated 3 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- Windows Antivirus Evasion and Memory Injection☆12Feb 19, 2022Updated 4 years ago
- Analysis and Creation of Wordlists with Complex Passwords for Password Cracking☆10Feb 23, 2026Updated 2 weeks ago
- 个人渗透测试常用加解密算法实现。☆12May 18, 2023Updated 2 years ago
- A collection of open source and commercial tools that aid in red team operations.☆13Apr 26, 2018Updated 7 years ago
- A static analysis framework for NASL.☆14Nov 30, 2022Updated 3 years ago
- DigDog-基于深度学习和内存取证技术的恶意软件检测框架☆10Mar 14, 2023Updated 2 years ago
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- All-in-One Safety Evaluation Framwork☆42Updated this week
- ☆37Feb 12, 2026Updated 3 weeks ago
- A sophisticated GUI tool for creating malicious RAR archives that exploit the WinRAR path traversal vulnerability (CVE-2025-8088) using A…☆25Sep 4, 2025Updated 6 months ago
- OpenSSH Vulnerabilities Scanner: Bulk Scanning Tool for 21 different OpenSSH CVEs.☆10Apr 29, 2025Updated 10 months ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- rootX is a modern, feature-rich IRC client built with Python and Tkinter, offering a clean and intuitive graphical interface while mainta…☆13Dec 8, 2025Updated 3 months ago