stratosphereips / a-study-of-remote-access-trojansLinks
This repository contains a curated list of papers, articles and other sources related to remote access trojans.
☆46Updated 3 years ago
Alternatives and similar repositories for a-study-of-remote-access-trojans
Users that are interested in a-study-of-remote-access-trojans are comparing it to the libraries listed below
Sorting:
- A Remote Administration Tool (RAT) for Windows written in C++ with a fancy C.L.I.☆61Updated 2 years ago
- Fsociety RAT, The Open Source C++ Remote Administration Tool (RAT)☆40Updated 3 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆50Updated 4 years ago
- Well, I have created this shit for educational pruposes (I think)☆38Updated 3 years ago
- A Hidden and Undetectable Remote Access Tool written in C++ and Server in Python3.☆68Updated 2 years ago
- Remcos RAT V3.8.0 Latest version☆33Updated 3 years ago
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.☆177Updated 3 years ago
- Koadic C3 COM Command & Control - JScript RAT☆49Updated 8 years ago
- Remote Access Trojan I wrote, but didn't finish. Although, you could use this as is without many issues.☆39Updated last year
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆59Updated 2 years ago
- A collection of malwares found on the internet.☆64Updated 2 years ago
- It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executab…☆47Updated 3 years ago
- Persistent & Undetectable Malware Backdoor☆28Updated last year
- An advanced Ransomware written in C++ and fully customizable☆94Updated 2 years ago
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆80Updated 2 years ago
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.☆90Updated 8 years ago
- Create a fully undetectable backdoor with simple steps.☆77Updated 3 years ago
- A database of RAT collected from Internet☆158Updated 5 years ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆78Updated 2 years ago
- A simple and efficent script to obfuscate python payloads to make it completely FUD☆39Updated 2 years ago
- Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)☆33Updated 3 years ago
- Collection Of LolSec☆37Updated 6 years ago
- ☆22Updated 2 years ago
- Security and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.☆65Updated 3 weeks ago
- Windows OS keylogger with a hook mechanism (i.e. with a keyboard hook procedure).☆82Updated 2 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆92Updated 4 years ago
- the assembly shell and backdoor Trojan☆18Updated 4 years ago
- Reversed source code to the Babuk ransomware builder.☆17Updated 4 years ago
- An open-source .NET Ransomware