umacryptosoft / USDT-TRC20-WalletView external linksLinks
USDT Wallet -TRX Wallet - TRC20 Wallet, Transfer
☆194Nov 4, 2025Updated 3 months ago
Alternatives and similar repositories for USDT-TRC20-Wallet
Users that are interested in USDT-TRC20-Wallet are comparing it to the libraries listed below
Sorting:
- ☆16Nov 28, 2025Updated 2 months ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆32Jun 23, 2022Updated 3 years ago
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- A Modern, stable and advanced login system.☆13Oct 13, 2021Updated 4 years ago
- Threat Hijacking Simple Implementation☆18Feb 24, 2025Updated 11 months ago
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆13Jul 14, 2022Updated 3 years ago
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆10Mar 25, 2021Updated 4 years ago
- Test antiviruses☆12Dec 3, 2023Updated 2 years ago
- .NET 4.5 Remote Access Tool (RAT) implementation with Telegram's API as server☆11Jul 29, 2022Updated 3 years ago
- BypassAV无net添加windows用户☆10Jan 7, 2021Updated 5 years ago
- EternalBlue/DoublePulsar python wrapper☆10Nov 22, 2017Updated 8 years ago
- Dynamic README in neofetch style☆49Updated this week
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Dec 16, 2021Updated 4 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- simple zero-dependency timer implementation☆12May 24, 2023Updated 2 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- Former UEFI Firmware Rootkit Replicating MoonBounce / ESPECTRE☆11Jun 14, 2022Updated 3 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- .NET Code Virtualization with cool features. Once intended to sell. Rip VirtualGuard.io☆16Feb 8, 2026Updated last week
- Changes the window titles of running processes.☆10Aug 15, 2019Updated 6 years ago
- Bypassing AV, EDR, Application Whitelisting and ASR Rules☆13Apr 18, 2023Updated 2 years ago
- PE Injection with ring3 hook bypass☆10May 3, 2021Updated 4 years ago
- - Automated Discord bot for Submitting Rebates and getting you easy visa cards. Educational purposes only.☆16May 13, 2021Updated 4 years ago
- ☆11Jan 16, 2018Updated 8 years ago
- Windows Service with the implementation of the Process hollowing technique to run shellcode☆14Jul 20, 2023Updated 2 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆21Jul 9, 2022Updated 3 years ago
- Execute embedded Mimikatz☆13Nov 24, 2021Updated 4 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- ☆12Feb 28, 2022Updated 3 years ago
- Selective In-Memory Syscall Unhooking, a stealthy method to bypass user-mode hooks in ntdll.dll☆25Jul 9, 2025Updated 7 months ago
- Man in the browser attack is all about stealing credentials from sites running in internet-explorer by forcing user to logout and then ag…☆10Feb 17, 2023Updated 2 years ago
- Utility for running files/scripts/apps as Administrator☆13Nov 14, 2025Updated 3 months ago
- OpenRewrite recipes for data flow analysis.☆15Updated this week
- A windows kernel-mode rootkit with remote control☆12Sep 17, 2022Updated 3 years ago
- exp for useful vuln☆12Jul 9, 2021Updated 4 years ago
- Введение в разработку вредоносных программ☆11Oct 15, 2023Updated 2 years ago
- 关闭恶意驱动的文件和注册表保护☆14Jun 28, 2022Updated 3 years ago