☆88Apr 2, 2024Updated last year
Alternatives and similar repositories for TrojanFactory
Users that are interested in TrojanFactory are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Userspace remote keylogger for Linux, works with X, logs key stikes to a file and sends report by email.☆146Apr 30, 2024Updated last year
- ☆11Jan 20, 2021Updated 5 years ago
- ☆16Aug 14, 2022Updated 3 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28May 22, 2017Updated 8 years ago
- A Simple Script for Rubber Ducky which Exploits Windows $MFT Vulnerability☆25Sep 1, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- SkyRAT - Powershell Remote Administration Tool☆34Jan 8, 2018Updated 8 years ago
- Banana's Github Inteface☆17Jul 3, 2024Updated last year
- a quickly Rubber Ducky HTML Fork Bomb Attack☆21Feb 9, 2022Updated 4 years ago
- Another AMSI bypass - but in C++.☆25May 22, 2023Updated 2 years ago
- A very quickly script for rubber ducky which exploits the gatherNetworkInfo.vbs file in the C: \ Windows \ System32 folder to steal…☆26Feb 9, 2022Updated 4 years ago
- Simple Shellcode Runner in Rust Language☆18Dec 8, 2023Updated 2 years ago
- TinDog Website☆14Mar 2, 2022Updated 4 years ago
- bash script to help you , doing many penetration testing based on kali linux , help pentester and hackers to deal with kali linux in easy…☆18Apr 12, 2015Updated 10 years ago
- Some useful website projects created by php from scratch☆14May 9, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Face Mask Detection using TensorFlow and Keras☆18Apr 27, 2022Updated 3 years ago
- ☆10Jul 24, 2017Updated 8 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Jun 22, 2023Updated 2 years ago
- A collection of Evil String for Windows that causes various type of crash, bsod, filesystem corruption, etc. 💀💀💀☆28Nov 3, 2022Updated 3 years ago
- This repository contains all my javaScript project.☆17Dec 6, 2021Updated 4 years ago
- my github REDME☆19Oct 4, 2023Updated 2 years ago
- A Windows Utility to Help to Setup Network 4 the Hak5 Wifi Pineapple Devices☆28Jan 7, 2021Updated 5 years ago
- Paypal integration with expo ReactNative☆19Mar 18, 2021Updated 5 years ago
- Simple shellcode injector.☆13Jan 6, 2019Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Simple HTML page that i realized to test the CSS webkit filter DoS attack created by pwnsdx☆26Jul 10, 2024Updated last year
- Data Analysis and ML in Python.☆16Mar 1, 2022Updated 4 years ago
- This is the C version of the StratosphereLinuxIPS. It is mainly used for integration with Snort and other IDSs.☆12Feb 15, 2017Updated 9 years ago
- my resume☆21Feb 17, 2022Updated 4 years ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- ☆10Aug 9, 2023Updated 2 years ago
- Search without being tracked-(Your Own Private Search Engine )☆17Jul 4, 2021Updated 4 years ago
- A small utility and interface for renaming files using the Unicode Right-To-Left Override attack☆10Feb 16, 2016Updated 10 years ago
- My Site☆19Jan 18, 2023Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆22Sep 20, 2022Updated 3 years ago
- Uptime checker for tor hidden services☆12Feb 14, 2018Updated 8 years ago
- Pig is a simple dice game. Players take turns to roll a single dice as many times as they wish, adding all roll results to a running tota…☆23May 14, 2022Updated 3 years ago
- Automatic DLL comment link generation and explaination of the DLL Proxying techniques☆10Aug 19, 2021Updated 4 years ago
- ☆26Jan 5, 2025Updated last year
- POC to demostrates how to hack a bank account on C#☆19Aug 26, 2014Updated 11 years ago
- ☆17Updated this week