to1018rose / A-large-collection-of-TrojanView external linksLinks
A large collection of Troajn
☆36Aug 26, 2022Updated 3 years ago
Alternatives and similar repositories for A-large-collection-of-Trojan
Users that are interested in A-large-collection-of-Trojan are comparing it to the libraries listed below
Sorting:
- A Multilayered AV/EDR Evasion Framework and AV Testing Tool.☆18Jun 28, 2025Updated 7 months ago
- Beacon Object File implementation of Yaxser's Backstab☆15Mar 9, 2022Updated 3 years ago
- Convert Any Exe to Bin (Base64 Output or Binary)☆21Jun 19, 2020Updated 5 years ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆27Nov 20, 2024Updated last year
- Some of my custom "tools".☆28Feb 21, 2022Updated 3 years ago
- OsintifyX: Powerful Open-source OSINT tool for extracting valuable information from Instagram profiles. OSINT: Instagram Forensics Tool☆11Feb 19, 2024Updated last year
- RtspBruter is a RTSP(Real Time Streaming Protocol) brute☆34Apr 27, 2020Updated 5 years ago
- This is a clone of Apple's iPhone 15 Pro website using React.js and TailwindCSS. It highlights the effective use of GSAP (Greensock Anima…☆15Apr 21, 2024Updated last year
- A small (Edited) POC to make defender useless by removing its token privileges and lowering the token integrity☆32Jun 28, 2022Updated 3 years ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- this project can extract contact email address from many site.☆12Sep 26, 2021Updated 4 years ago
- ☆13Jun 29, 2023Updated 2 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- A repository holding Proof of Concepts for executing the calculator application via different file formats☆42Jun 27, 2024Updated last year
- Discover Non-Discoverable Bluetooth Classic devices☆13Oct 10, 2024Updated last year
- Android gallery spyware☆11Feb 7, 2023Updated 3 years ago
- An simple crypter made with Xanthorox AI for Testing v5 pro capabilities☆35Feb 11, 2026Updated last week
- Generator userbars Warface☆13Dec 31, 2023Updated 2 years ago
- Auto exploitation tool for CVE-2024-24401.☆36Sep 7, 2024Updated last year
- ☆11Dec 8, 2023Updated 2 years ago
- EWDK C++ toolchain for bazel☆11Feb 1, 2026Updated 2 weeks ago
- Decrypt passwords/cookies/history/bookmarks from the browser. 一款可全平台运行的浏览器数据导出解密工具。☆11Nov 28, 2022Updated 3 years ago
- ☆12Apr 26, 2022Updated 3 years ago
- OpenSSH Vulnerabilities Scanner: Bulk Scanning Tool for 21 different OpenSSH CVEs.☆10Apr 29, 2025Updated 9 months ago
- A multifunctional Android RAT with GUI based Web Panel without port forwarding.☆11Dec 18, 2022Updated 3 years ago
- Build wordlists from the common-crawl index☆12Oct 9, 2022Updated 3 years ago
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- Linux kernel-mode and user-space with wine/MinGW/Windows compability hacking library.☆12Sep 15, 2022Updated 3 years ago
- Sarif exporter☆13Apr 23, 2024Updated last year
- 一个简单的 稳定 ICMP 传输 示例,在公网中传输可能有点慢,但很稳定,适合初学者☆11Mar 9, 2022Updated 3 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- A Python-based VBScript Code Obfuscator☆43Dec 2, 2025Updated 2 months ago
- Cracking hashes using AWS GPU instances☆10Sep 4, 2017Updated 8 years ago
- Analysis and Creation of Wordlists with Complex Passwords for Password Cracking☆10Jul 31, 2023Updated 2 years ago
- 个人渗透测试常用加解密算法实现。☆12May 18, 2023Updated 2 years ago
- Simple tool to view all passwords of WiFi networks saved in Windows☆12Sep 7, 2025Updated 5 months ago
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 2 months ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- DUQU MALWARE SOURCE + BINARY + More coming☆12Feb 6, 2023Updated 3 years ago