threatland / TL-TROJAN
A collection of source code for various RATs, Stealers, and other Trojans.
☆429Updated 5 years ago
Alternatives and similar repositories for TL-TROJAN:
Users that are interested in TL-TROJAN are comparing it to the libraries listed below
- A collection of source code for various botnets.☆556Updated 5 years ago
- Framework for building Windows malware, written in C++☆514Updated 2 months ago
- A simple, fully python ransomware PoC☆373Updated 4 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.☆602Updated 3 years ago
- HTTP Botnet☆897Updated 4 years ago
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.☆548Updated 4 months ago
- Malware exploits☆543Updated 5 years ago
- Dangerous Malwares☆205Updated 8 years ago
- A collection of fraud related tools for research.☆149Updated 5 years ago
- A super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Ba…☆142Updated 5 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,400Updated 6 years ago
- Windows Crypter☆418Updated 8 years ago
- collection of articles/books about programing☆566Updated last year
- PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.☆330Updated 4 months ago
- Windows Remote-Access-Trojan☆654Updated 8 years ago
- Collection of Remote Administration Tool samples☆252Updated 9 years ago
- Remote Access Tool☆594Updated last year
- Python / C# Unmanaged PowerShell based RAT☆777Updated 2 years ago
- An Python Script For Generating Payloads that Bypasses All Antivirus so far .☆975Updated last year
- CryptoLocker is open source files encrypt-er. Crypto is developed in Visual C++. It has features encrypt all file, lock down the system a…☆139Updated last year
- Crypter in Python 3 with advanced functionality, Bypass VM, Encrypt Source with AES & Base64 Encoding | Evil Code is executed by brutefor…☆350Updated 2 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948Updated 5 years ago
- Botnet☆878Updated 2 years ago
- NXcrypt - 'python backdoor' framework☆363Updated 7 years ago
- Cloak can backdoor any python script with some tricks.☆489Updated 5 years ago
- malware source codes☆552Updated 2 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆332Updated 8 months ago
- transform your payload.exe into one fake word doc (.ppt)☆465Updated 5 years ago
- Pythonic ransomware proof of concept.☆217Updated 4 years ago
- Malicious Macro Generator☆825Updated 5 years ago