This is a release of the torCT PHP RAT for people willing to research RATs and how they work.
☆18Dec 3, 2015Updated 10 years ago
Alternatives and similar repositories for torCT-PHP-RAT
Users that are interested in torCT-PHP-RAT are comparing it to the libraries listed below
Sorting:
- A repository of LIVE malwares for your own joy and pleasure☆16Apr 21, 2016Updated 9 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Nov 12, 2016Updated 9 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆35Nov 14, 2016Updated 9 years ago
- Archive of leaked Equation Group materials☆17Aug 17, 2016Updated 9 years ago
- Leaked Mirai Source Code for Research/IoC Development Purposes☆16Oct 31, 2016Updated 9 years ago
- Brand New Code Injection for Windows☆13Oct 28, 2016Updated 9 years ago
- Miscellaneous exploit code☆21Oct 30, 2016Updated 9 years ago
- Malicious Software SRC Extract☆32Jan 2, 2023Updated 3 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android) Remote Administration Tool with an embedded Python interpreter.☆15Mar 19, 2016Updated 9 years ago
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- Framework for Making Environmental Keyed Payloads☆14Nov 1, 2016Updated 9 years ago
- Various Crypter Project☆10Feb 26, 2014Updated 12 years ago
- SQLi Tool/SQL Injection/Hijacker☆45Dec 10, 2016Updated 9 years ago
- Exploitkit☆188Dec 10, 2016Updated 9 years ago
- malwares src dump☆41Mar 3, 2017Updated 8 years ago
- WebShell Dump☆178Dec 10, 2016Updated 9 years ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Mar 11, 2013Updated 12 years ago
- D-RAT SRC Extract☆12Dec 24, 2016Updated 9 years ago
- Unity SDK for Aptabase: Open Source, Privacy-First and Simple Analytics for Mobile, Desktop and Web Apps☆20Feb 22, 2026Updated last week
- BlackWorm SRC Extract☆16Dec 24, 2016Updated 9 years ago
- Windows Remote Administration Tool via Telegram☆36Apr 20, 2017Updated 8 years ago
- Zero-Day Code Injection and Persistence Technique☆30Mar 23, 2017Updated 8 years ago
- Extract, defang, resolve names and IPs from text☆23Jan 29, 2026Updated last month
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆23Dec 30, 2023Updated 2 years ago
- Launch hacking tests in cloud providers securely, isolated and without raise security alerts in the provider☆16Dec 12, 2017Updated 8 years ago
- SideEffect Keylogger☆14Dec 30, 2016Updated 9 years ago
- This tool will help in generating reverse shells easily for all types of OS.☆20Aug 4, 2023Updated 2 years ago
- Windows Remote-Access-Trojan☆716Dec 28, 2016Updated 9 years ago
- A security tool for detecting suspicious PDF modifications commonly found in BEC☆41Aug 4, 2016Updated 9 years ago
- Linux-KVM with rVMI extensions☆22Aug 28, 2017Updated 8 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Dec 12, 2017Updated 8 years ago
- ZeroRemote Trojan SRC Extract☆19Mar 1, 2017Updated 9 years ago
- Live Dangerous Linux Malware Samples!☆22May 5, 2020Updated 5 years ago
- Windows Stealer☆190Dec 10, 2016Updated 9 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆58Mar 19, 2020Updated 5 years ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Oct 21, 2023Updated 2 years ago
- QEMU with rVMI extensions☆25Jul 25, 2017Updated 8 years ago
- ☆29Jul 7, 2023Updated 2 years ago
- Xanity PHP RAT leak For Researchers☆21Dec 3, 2015Updated 10 years ago