Count Dracul Yeamin the Scorpio's Projects
A Stealthy Trojan Spyware (keylogger-spyware-malware-worm-spy-virus-fud-undetectable-computer-windows-pc-c-c++)
Trojanize your payload - WinRAR (SFX) automatization - under Linux distros
Trojan Client for macOS, ported from ShadowsocksX-NG. Please use it in compliance with laws, regulations and rules.
TrojanZoo provides a universal pytorch platform to conduct security researches (especially backdoor attacks/defenses) of image classification in deep learning.
A high performance implementation of the Ruby programming language, built on GraalVM.
A port scanner and service detection tool that uses 1000 goroutines at once to scan any hosts's ip or fqdn with the sole purpose of testing your own network to ensure there are no malicious services running.
GSM Sniffing tool
Russia Wipers Dropper (educational-purposes )
HTTP Botnet
Umbral Stealer is a fast, lightweight stealer written in C#. The collected data is transferred through discord webhooks.
A Phishing Dropper designed to Pentest.
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.
Universal Radio Hacker: Investigate Wireless Protocols Like A Boss
Powerful mutable web directory fuzzer to bruteforce existing and/or hidden files or directories.
wikileaks dump ē»“åŗę³åÆę°ę®
The Official USB Rubber Ducky Payload Repository
Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
The Best Stealer, Fully Undetected Discord, Browser, Roblox Stealer, Cookie Password Token Stealer
Droppers for all platforms
Exploit repository
Too big to upload (42.7GB), try using a mirror or the torrent
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
venom - C2 shellcode generator/compiler/handler
A new bootable USB solution.
THE most powerful stealer / builder 2024
Virus - Trojans - Worms - Malwares
Collection of ancient computer virus source codes
An android (virus) application that can be use to piss off someone ;)
virus that runs on AR drones and infects other drones
Virus RAT v8.0 Beta