This repository contains a curated list of papers, articles and other sources related to remote access trojans.
☆52Oct 9, 2022Updated 3 years ago
Alternatives and similar repositories for a-study-of-remote-access-trojans
Users that are interested in a-study-of-remote-access-trojans are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- FUD Linux Remote Access Trojan☆18Nov 18, 2022Updated 3 years ago
- Robust API monitoring system presented in the paper "Designing Robust API Monitoring Solutions" (IEEE TDSC)☆25Dec 8, 2021Updated 4 years ago
- Archive of BO2K_1_1_6 filez + src☆21Mar 1, 2018Updated 8 years ago
- SymbolTypeViewer_汉化☆17Sep 4, 2020Updated 5 years ago
- Quantum zero-day exploit Hunting for vulnerabilities as small as a quantum particle☆13Jun 13, 2025Updated 9 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Herramienta automatizada para enviar correos con phising.☆16Jul 29, 2020Updated 5 years ago
- CSharp4Pentesters☆11Mar 5, 2022Updated 4 years ago
- This is a tutorial and introduction to Reflective DLL Injection + reading outputs of injected dll using named pipes.☆20Feb 8, 2025Updated last year
- SWAT - System-Wide Analysis Toolkit☆16Oct 4, 2021Updated 4 years ago
- A blanked execution framework based on the Unicorn engine☆19Jan 29, 2017Updated 9 years ago
- Demo projects using virt86☆12Jul 5, 2019Updated 6 years ago
- ☆16May 6, 2015Updated 10 years ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆18Aug 20, 2023Updated 2 years ago
- Some basic UEFI definitions and symbols exactly as definied by the UEFI spec, in the form of C++ headers to be used for writing C++ UEFI …☆14Sep 11, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A System for Differential Debugging☆23Apr 10, 2025Updated 11 months ago
- Local OXID Resolver (LCLOR) : Research and Tooling☆37May 19, 2021Updated 4 years ago
- ☆46Dec 30, 2018Updated 7 years ago
- Python RAT with reverse connection and asymmetric encrypted communications☆16Jun 30, 2020Updated 5 years ago
- ☆11May 30, 2021Updated 4 years ago
- Experimental Windows .text section Patch Detector☆22Jan 26, 2015Updated 11 years ago
- An interactive mock C2 server☆17Feb 25, 2023Updated 3 years ago
- Tool for finding Known Vulnerability of an ip address☆13Nov 13, 2024Updated last year
- v1版完成对PE头,区段,输入表的解析☆11Apr 16, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Some of the lab files for the SANS Institute course SEC505: Securing Windows and PowerShell Automation: https://sans.org/sec505☆18Jun 8, 2017Updated 8 years ago
- Code for the "Predictive Context-sensitive Fuzzing" NDSS'24 paper☆30Feb 29, 2024Updated 2 years ago
- QEMU-based Memory Sanitizer for binary software.☆22Nov 19, 2025Updated 4 months ago
- The Web UI for Antnium☆27Jun 14, 2022Updated 3 years ago
- SQL Detector Tool In Go Language☆22Jan 10, 2023Updated 3 years ago
- TInA is an automated, generic, verification-friendly and trustworthy lifting technique turning GNU-style inline assembly into semanticall…☆30Jul 7, 2021Updated 4 years ago
- ☆46Jun 25, 2024Updated last year
- An example of how to spawn a process with a spoofed parent PID (Visual C++)☆29Mar 3, 2019Updated 7 years ago
- Pipeleek scans CI/CD logs and artifacts to detect leaked secrets and pivot from them☆19Updated this week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- z64 Simulator☆19Nov 26, 2024Updated last year
- Build your emulation environment as needed☆67Apr 14, 2021Updated 4 years ago
- SQLiToolkit is a SQL injection Based Toolkit. There are many features such as Vulnerability Scanner, Url Fuzzer in this tool. This is a U…☆13Feb 8, 2022Updated 4 years ago
- Simulate device shutdown, ideal for use with anti-theft apps.☆20Dec 29, 2025Updated 2 months ago
- Installs And Executes Shellcode☆12Jul 26, 2015Updated 10 years ago
- ☆14Nov 29, 2019Updated 6 years ago
- testing123☆13Nov 23, 2024Updated last year