Count Dracul Yeamin the Scorpio's Projects
backup for Trojan-Qt5 v1.4.0
Trojan Source: Invisible Vulnerabilities
trojanๅค็จๆท็ฎก็็จๅบweb้กต้ข
A Stealthy Trojan Spyware (keylogger-spyware-malware-worm-spy-virus-fud-undetectable-computer-windows-pc-c-c++)
Trojanize your payload - WinRAR (SFX) automatization - under Linux distros
Trojan Client for macOS, ported from ShadowsocksX-NG. Please use it in compliance with laws, regulations and rules.
TrojanZoo provides a universal pytorch platform to conduct security researches (especially backdoor attacks/defenses) of image classification in deep learning.
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.
Universal Radio Hacker: Investigate Wireless Protocols Like A Boss
Powerful mutable web directory fuzzer to bruteforce existing and/or hidden files or directories.
wikileaks dump ็ปดๅบๆณๅฏๆฐๆฎ
The Official USB Rubber Ducky Payload Repository
Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
Exploit repository
Too big to upload (42.7GB), try using a mirror or the torrent
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
venom - C2 shellcode generator/compiler/handler
Virus - Trojans - Worms - Malwares
Collection of ancient computer virus source codes
An android (virus) application that can be use to piss off someone ;)
virus that runs on AR drones and infects other drones
Virus RAT v8.0 Beta
Trojans/Viruses/Worms/Rootkits Source Code Repository
Visual Basic Scripts Utilities. Fun, Automation, Fundamentals. With the help of these scripts, I develop lots of Exploits which I'm used for automation system tasks. these vb scripts I am also used for system security exploitation.
A hacky debugger UI for hackers
VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit
Virus source code database
Docker-Compose file for vulnerability environment
This cheasheet is aimed at the CTF Players and Beginners to help them sort Vulnhub Labs. This list contains all the writeups available on hackingarticles.
Generates a Windows 'vulnerable' machine from ISOs