Skip to content

Trojan Stock Photos & Royalty-Free Images

All the stock photos you need and more from our global creative community.

Price is in US dollars and excludes tax and handling fees

524 stock photos

Clear all
Antique iron spartan head protection isolated on white.

Antique iron spartan head protection isolated on white.

$6
Hooded computer hacker stealing information with laptop

Hooded computer hacker stealing information with laptop

$5
Hooded computer hacker stealing information with laptop

Hooded computer hacker stealing information with laptop

$5
The golden mask of Agamemnon

The golden mask of Agamemnon

$10
Ancient iron spartan helmet isolated on white.

Ancient iron spartan helmet isolated on white.

$5
Ancient iron spartan head protection isolated on white.

Ancient iron spartan head protection isolated on white.

$5
Hooded computer hacker stealing information with laptop

Hooded computer hacker stealing information with laptop

$5
CPU vulnerability. 3D render. hacked processor concept

CPU vulnerability. 3D render. hacked processor concept

by MegiasD
$5
Hooded computer hacker stealing information with laptop

Hooded computer hacker stealing information with laptop

$5
Ancient iron spartan silver helmet isolated on white.

Ancient iron spartan silver helmet isolated on white.

$6
Crop hands hacking computer

Crop hands hacking computer

by kegfire
$5
Female hacker committing cyberattack on server firewall

Female hacker committing cyberattack on server firewall

$10
Spy using hacking concept and hacktivism for digital espionage

Spy using hacking concept and hacktivism for digital espionage

$10
Professional hacker using online pc system to access sensitive information

Professional hacker using online pc system to access sensitive information

$10
Skilled web thief hacking network with digital espionage concept

Skilled web thief hacking network with digital espionage concept

$10
Hackers team trying to steal government information at night

Hackers team trying to steal government information at night

$10
Hackers happy after sabotaging computers

Hackers happy after sabotaging computers

$10
Female spy breaking into computer firewall to hack system

Female spy breaking into computer firewall to hack system

$10
Cyber criminal committing cryptojacking and espionage crime

Cyber criminal committing cryptojacking and espionage crime

$10
Hacking criminals using dark web to steal government data

Hacking criminals using dark web to steal government data

$10
Hacker happy after successfully gaining access to victims data

Hacker happy after successfully gaining access to victims data

$10
Hackers doing computer sabotage using ransomware on tablet

Hackers doing computer sabotage using ransomware on tablet

$10
Young dangerous spy using encryption on computer firewall

Young dangerous spy using encryption on computer firewall

$10
Hacker arriving in underground base, ready to do computer sabotage

Hacker arriving in underground base, ready to do computer sabotage

$10
Hackers use ransomware on mockup tablet

Hackers use ransomware on mockup tablet

$10
Muscular spearman from ancient greece with long spear

Muscular spearman from ancient greece with long spear

$5
Strong swordsman from antique greece against grey background

Strong swordsman from antique greece against grey background

$5
Greek spearman from past with helmet holding spear and shield

Greek spearman from past with helmet holding spear and shield

$5
Greek warlord from past with long spear and shield

Greek warlord from past with long spear and shield

$5
Combative spearman from antique greece against gray background

Combative spearman from antique greece against gray background

$5