GoAT (Golang Advanced Trojan) is a trojan that uses Twitter as a C&C server
☆259Jul 13, 2017Updated 8 years ago
Alternatives and similar repositories for GoAT
Users that are interested in GoAT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Go based HTTP Botnet☆118Nov 25, 2018Updated 7 years ago
- Second Version of The GoBot Botnet, But more advanced.☆760Sep 24, 2021Updated 4 years ago
- EGESPLOIT is a golang library for malware development☆339Jan 26, 2017Updated 9 years ago
- A Completely Distributed Botnet written in Go - DEPRECATED☆12Jul 1, 2016Updated 9 years ago
- Pure HTTP and DNS Botnet written in Golang for Windows.☆154Aug 20, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A tcp botnet written in golang☆104May 14, 2019Updated 6 years ago
- ☆28Oct 30, 2016Updated 9 years ago
- Golang malware development library☆978Dec 13, 2024Updated last year
- HERCULES is a special payload generator that can bypass antivirus softwares.☆600Jul 18, 2021Updated 4 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- framework to rapidly implement custom droppers for all three major operating systems☆704Feb 24, 2024Updated 2 years ago
- Botnet SDK Based on Zeus HTTP Malware (Educational Purposes)☆18Sep 7, 2019Updated 6 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Remote Administration Toolkit (or Trojan) for POSiX (Linux/Unix) system working as a Web Service☆173Jun 15, 2019Updated 6 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22May 30, 2015Updated 10 years ago
- Extensible Red Team Framework☆112Dec 2, 2019Updated 6 years ago
- The Grum Spam Bot☆20Feb 25, 2015Updated 11 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆255May 1, 2023Updated 2 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆209Nov 20, 2017Updated 8 years ago
- pentest toolbox☆27Jul 24, 2022Updated 3 years ago
- A fully featured Windows backdoor that uses Gmail as a C&C server☆505Jun 27, 2019Updated 6 years ago
- Tinba Banking Trojan☆87Feb 25, 2015Updated 11 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆52Feb 28, 2017Updated 9 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- A super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Ba…☆143May 30, 2019Updated 6 years ago
- create and work with /usr/local/bin/perl5.*☆20Jun 8, 2022Updated 3 years ago
- A simple, extensible C&C beaconing system.☆104Feb 13, 2018Updated 8 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆62Oct 11, 2015Updated 10 years ago
- A POC Windows crypto-ransomware (Academic). Now Ransom:Win32/MauriCrypt.MK!MTB☆960Nov 17, 2018Updated 7 years ago
- Powershell C2 Server and Implants☆575Nov 11, 2019Updated 6 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆103May 25, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Self defense post module for metasploit☆17Aug 30, 2019Updated 6 years ago
- Obfuscate Go binaries and packages☆1,569Dec 7, 2021Updated 4 years ago
- Golang Implant & Post-Exploitation Framework☆60Jun 30, 2023Updated 2 years ago
- SpeedPhishing Framework☆450Aug 8, 2019Updated 6 years ago
- PowerShell Runspace Post Exploitation Toolkit☆1,549Aug 2, 2019Updated 6 years ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆325Jun 25, 2022Updated 3 years ago
- Sockstress (CVE-2008-4609) DDoS implementation written in Go☆17Jul 2, 2016Updated 9 years ago