threatland / TL-TROJAN
A collection of source code for various RATs, Stealers, and other Trojans.
☆437Updated 5 years ago
Alternatives and similar repositories for TL-TROJAN
Users that are interested in TL-TROJAN are comparing it to the libraries listed below
Sorting:
- A collection of source code for various botnets.☆558Updated 5 years ago
- Framework for building Windows malware, written in C++☆518Updated 3 months ago
- Collection of cracked malware, and ebooks☆651Updated 2 years ago
- collection of articles/books about programing☆573Updated last year
- PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.☆328Updated 6 months ago
- HTTP Botnet☆904Updated 4 years ago
- A collection of fraud related tools for research.☆148Updated 5 years ago
- Crypter in Python 3 with advanced functionality, Bypass VM, Encrypt Source with AES & Base64 Encoding | Evil Code is executed by brutefor…☆353Updated 3 years ago
- Remote Access Tool☆600Updated 2 years ago
- ParadoxiaRat : Native Windows Remote access Tool.☆800Updated 2 years ago
- Malware exploits☆545Updated 5 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.☆602Updated 3 years ago
- An Python Script For Generating Payloads that Bypasses All Antivirus so far .☆980Updated last year
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.☆548Updated 6 months ago
- A simple, fully python ransomware PoC☆374Updated 4 years ago
- https://twitter.com/itsreallynick/status/1120410950430089224☆396Updated 6 years ago
- transform your payload.exe into one fake word doc (.ppt)☆468Updated 5 years ago
- CryptoLocker is open source files encrypt-er. Crypto is developed in Visual C++. It has features encrypt all file, lock down the system a…☆140Updated last year
- Malware sample library.☆574Updated last year
- Pythonic ransomware proof of concept.☆219Updated 5 years ago
- A list of private and public (more or less) blackhat boards☆268Updated 6 years ago
- Complete Python RansomeWare Source Code With Full Decoumetions.☆217Updated 2 years ago
- This is Jester ransomware like, in Mr Robot movie (coded by Darlene S1E2,3), Please beware warning, after start you can't recover the fil…☆367Updated 4 years ago
- Dangerous Malwares☆203Updated 8 years ago
- Botnet☆889Updated 2 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆332Updated 9 months ago
- Collection of Remote Administration Tool samples☆258Updated 10 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆949Updated 6 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆544Updated 4 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,410Updated 6 years ago