This is a release of the torCT PHP RAT for people willing to research RATs and how they work.
☆18Dec 3, 2015Updated 10 years ago
Alternatives and similar repositories for torCT-PHP-RAT
Users that are interested in torCT-PHP-RAT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Remote Access Trojan(RAT), Miner, DDoS☆34Nov 14, 2016Updated 9 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Nov 12, 2016Updated 9 years ago
- Miscellaneous exploit code☆21Oct 30, 2016Updated 9 years ago
- Various Crypter Project☆10Feb 26, 2014Updated 12 years ago
- Archive of leaked Equation Group materials☆15Aug 17, 2016Updated 9 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Remote Administration Tool for Windows☆41Mar 30, 2016Updated 10 years ago
- Brand New Code Injection for Windows☆13Oct 28, 2016Updated 9 years ago
- Malicious Software SRC Extract☆31Jan 2, 2023Updated 3 years ago
- SQLi Tool/SQL Injection/Hijacker☆46Dec 10, 2016Updated 9 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android) Remote Administration Tool with an embedded Python interpreter.☆15Mar 19, 2016Updated 10 years ago
- Framework for Making Environmental Keyed Payloads☆13Nov 1, 2016Updated 9 years ago
- Dangerous Malwares☆215Dec 10, 2016Updated 9 years ago
- malwares src dump☆41Mar 3, 2017Updated 9 years ago
- Unity SDK for Aptabase: Open Source, Privacy-First and Simple Analytics for Mobile, Desktop and Web Apps☆20Feb 22, 2026Updated 2 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- WebShell Dump☆177Dec 10, 2016Updated 9 years ago
- Windows Remote-Access-Trojan☆733Dec 28, 2016Updated 9 years ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆16Aug 4, 2023Updated 2 years ago
- D-RAT SRC Extract☆13Dec 24, 2016Updated 9 years ago
- Launch hacking tests in cloud providers securely, isolated and without raise security alerts in the provider☆16Dec 12, 2017Updated 8 years ago
- BlackWorm SRC Extract☆16Dec 24, 2016Updated 9 years ago
- ☆29Jul 7, 2023Updated 2 years ago
- Tattoo shop for FXServer built on top of ESX☆11Jun 5, 2020Updated 5 years ago
- Dependencies: ESX Legacy, ox_lib, ox_target, ox_inventory☆12Feb 24, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Botnet☆948Feb 8, 2023Updated 3 years ago
- Windows Stealer☆190Dec 10, 2016Updated 9 years ago
- Nim-IDA-FLIRT-Generator☆20Dec 5, 2023Updated 2 years ago
- Fiddler2 Plugin for AMF format parsing☆14May 9, 2016Updated 9 years ago
- tensorflow on time-series prediction☆13Mar 24, 2024Updated 2 years ago
- ZeroRemote Trojan SRC Extract☆20Mar 1, 2017Updated 9 years ago
- This tool will help in generating reverse shells easily for all types of OS.☆19Aug 4, 2023Updated 2 years ago
- An illegal medical assistant grandma for QBCore framework in fivem☆14Nov 18, 2023Updated 2 years ago
- Simple Antivirus☆10Dec 24, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- weapon component for esx☆11Apr 1, 2020Updated 6 years ago
- A small resource by @Demigod916 to sell items for black money with ox_inventory☆11Aug 2, 2024Updated last year
- No one writes dumb malware anymore. This is a repo for dumb malware.☆10Apr 18, 2017Updated 9 years ago
- ☆24Feb 3, 2021Updated 5 years ago
- Gichidan - CLI wrapper for Ichidan deep-web search engine.☆33Apr 20, 2018Updated 8 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Dec 12, 2017Updated 8 years ago
- eZpublish vulnerability scanner☆10Feb 20, 2020Updated 6 years ago