GoAT (Golang Advanced Trojan) is a trojan that uses Twitter as a C&C server
☆261Jul 13, 2017Updated 8 years ago
Alternatives and similar repositories for GoAT
Users that are interested in GoAT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Go based HTTP Botnet☆118Nov 25, 2018Updated 7 years ago
- Second Version of The GoBot Botnet, But more advanced.☆758Sep 24, 2021Updated 4 years ago
- EGESPLOIT is a golang library for malware development☆339Jan 26, 2017Updated 9 years ago
- A Completely Distributed Botnet written in Go - DEPRECATED☆12Jul 1, 2016Updated 9 years ago
- Pure HTTP and DNS Botnet written in Golang for Windows.☆156Aug 20, 2017Updated 8 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A tcp botnet written in golang☆104May 14, 2019Updated 6 years ago
- ☆28Oct 30, 2016Updated 9 years ago
- Golang malware development library☆977Dec 13, 2024Updated last year
- HERCULES is a special payload generator that can bypass antivirus softwares.☆601Jul 18, 2021Updated 4 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- framework to rapidly implement custom droppers for all three major operating systems☆704Feb 24, 2024Updated 2 years ago
- Botnet SDK Based on Zeus HTTP Malware (Educational Purposes)☆18Sep 7, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Remote Administration Toolkit (or Trojan) for POSiX (Linux/Unix) system working as a Web Service☆173Jun 15, 2019Updated 6 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22May 30, 2015Updated 10 years ago
- Extensible Red Team Framework☆112Dec 2, 2019Updated 6 years ago
- The Grum Spam Bot☆20Feb 25, 2015Updated 11 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆254May 1, 2023Updated 2 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆209Nov 20, 2017Updated 8 years ago
- pentest toolbox☆27Jul 24, 2022Updated 3 years ago
- A fully featured Windows backdoor that uses Gmail as a C&C server☆506Jun 27, 2019Updated 6 years ago
- Tinba Banking Trojan☆87Feb 25, 2015Updated 11 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆52Feb 28, 2017Updated 9 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- A super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Ba…☆143May 30, 2019Updated 6 years ago
- create and work with /usr/local/bin/perl5.*☆20Jun 8, 2022Updated 3 years ago
- A POC Windows crypto-ransomware (Academic). Now Ransom:Win32/MauriCrypt.MK!MTB☆959Nov 17, 2018Updated 7 years ago
- A simple, extensible C&C beaconing system.☆103Feb 13, 2018Updated 8 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆62Oct 11, 2015Updated 10 years ago
- Powershell C2 Server and Implants☆576Nov 11, 2019Updated 6 years ago
- Obfuscate Go binaries and packages☆1,569Dec 7, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Post Exploitation agent which uses a browser to do C2 operations.☆103May 25, 2018Updated 7 years ago
- Self defense post module for metasploit☆17Aug 30, 2019Updated 6 years ago
- Golang Implant & Post-Exploitation Framework☆60Jun 30, 2023Updated 2 years ago
- SpeedPhishing Framework☆450Aug 8, 2019Updated 6 years ago
- PowerShell Runspace Post Exploitation Toolkit☆1,548Aug 2, 2019Updated 6 years ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆328Jun 25, 2022Updated 3 years ago
- Sockstress (CVE-2008-4609) DDoS implementation written in Go☆17Jul 2, 2016Updated 9 years ago