This is a release of the torCT PHP RAT for people willing to research RATs and how they work.
☆18Dec 3, 2015Updated 10 years ago
Alternatives and similar repositories for torCT-PHP-RAT
Users that are interested in torCT-PHP-RAT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Remote Access Trojan(RAT), Miner, DDoS☆34Nov 14, 2016Updated 9 years ago
- A repository of LIVE malwares for your own joy and pleasure☆16Apr 21, 2016Updated 10 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Nov 12, 2016Updated 9 years ago
- Miscellaneous exploit code☆21Oct 30, 2016Updated 9 years ago
- Various Crypter Project☆10Feb 26, 2014Updated 12 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Leaked Mirai Source Code for Research/IoC Development Purposes☆16Oct 31, 2016Updated 9 years ago
- Archive of leaked Equation Group materials☆15Aug 17, 2016Updated 9 years ago
- Remote Administration Tool for Windows☆41Mar 30, 2016Updated 10 years ago
- Brand New Code Injection for Windows☆13Oct 28, 2016Updated 9 years ago
- Malicious Software SRC Extract☆31Jan 2, 2023Updated 3 years ago
- SQLi Tool/SQL Injection/Hijacker☆46Dec 10, 2016Updated 9 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android) Remote Administration Tool with an embedded Python interpreter.☆15Mar 19, 2016Updated 10 years ago
- Exploitkit☆188Dec 10, 2016Updated 9 years ago
- Dangerous Malwares☆217Dec 10, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆18Nov 9, 2023Updated 2 years ago
- Unity SDK for Aptabase: Open Source, Privacy-First and Simple Analytics for Mobile, Desktop and Web Apps☆21Feb 22, 2026Updated 3 months ago
- Zero-Day Code Injection and Persistence Technique☆31Mar 23, 2017Updated 9 years ago
- WebShell Dump☆176Dec 10, 2016Updated 9 years ago
- Windows Remote-Access-Trojan☆734Dec 28, 2016Updated 9 years ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆16Aug 4, 2023Updated 2 years ago
- D-RAT SRC Extract☆14Dec 24, 2016Updated 9 years ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Mar 11, 2013Updated 13 years ago
- Launch hacking tests in cloud providers securely, isolated and without raise security alerts in the provider☆16Dec 12, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Windows Crypter☆423Dec 28, 2016Updated 9 years ago
- Tattoo shop for FXServer built on top of ESX☆11Jun 5, 2020Updated 5 years ago
- Integrated tool for extracting scripts and binaries of AutoIt, AutoHotKey, InnoSetup, NSIS executables and Decoding powershell / jse / vb…☆15Dec 10, 2018Updated 7 years ago
- Windows Stealer☆190Dec 10, 2016Updated 9 years ago
- Nim-IDA-FLIRT-Generator☆20Dec 5, 2023Updated 2 years ago
- Fiddler2 Plugin for AMF format parsing☆14May 9, 2016Updated 10 years ago
- SideEffect Keylogger☆15Dec 30, 2016Updated 9 years ago
- ZeroRemote Trojan SRC Extract☆21Mar 1, 2017Updated 9 years ago
- This tool will help in generating reverse shells easily for all types of OS.☆19Aug 4, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- An illegal medical assistant grandma for QBCore framework in fivem☆14Nov 18, 2023Updated 2 years ago
- A small resource by @Demigod916 to sell items for black money with ox_inventory☆11Aug 2, 2024Updated last year
- ☆24Feb 3, 2021Updated 5 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Dec 12, 2017Updated 8 years ago
- eZpublish vulnerability scanner☆10Feb 20, 2020Updated 6 years ago
- HTTP_POST Login BruteForce☆36Sep 26, 2022Updated 3 years ago
- Inject .Net payloads into other .Net assemblies on disk☆61Dec 12, 2019Updated 6 years ago