A collection of source code for various RATs, Stealers, and other Trojans.
☆453Aug 29, 2019Updated 6 years ago
Alternatives and similar repositories for TL-TROJAN
Users that are interested in TL-TROJAN are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of fraud related tools for research.☆150Aug 19, 2019Updated 6 years ago
- This repo contains scripts, frameworks, and other tools related to DDoS.☆35Aug 24, 2019Updated 6 years ago
- A collection of source code for various botnets.☆565Oct 9, 2019Updated 6 years ago
- ☆43Aug 1, 2019Updated 6 years ago
- Open Source C++ Crypter. AES-256 Bit Encryption, Virtual Machine Detection and Almost FUD☆128May 8, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆444Mar 31, 2026Updated 3 weeks ago
- Collection of Remote Administration Tool samples☆266May 12, 2015Updated 10 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆726Dec 26, 2022Updated 3 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆91Nov 9, 2019Updated 6 years ago
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆67Feb 24, 2022Updated 4 years ago
- 🔬Collection of malware, ransomware, RATs, botnets, stealers, etc.☆246Dec 15, 2021Updated 4 years ago
- Debugger checks in 3 ways☆19Jan 25, 2018Updated 8 years ago
- ☣️ Simple Master Boot Record (MBR) override example☆15Jul 22, 2017Updated 8 years ago
- ☆42Aug 10, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Personal collection of Remote Administration Tool sources. Dedicated for Ax0nes Forum at Ax0nes.com for education purpose☆80Mar 14, 2018Updated 8 years ago
- External C2 Using IE COM Objects☆100Feb 24, 2019Updated 7 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- Incarcero is a tool that creates Virtual Machines (VMs) preconfigured with malware analysis tools and security settings tailored for malw…☆92Nov 4, 2023Updated 2 years ago
- Self defense post module for metasploit☆17Aug 30, 2019Updated 6 years ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆330Jul 7, 2023Updated 2 years ago
- Executable that mutates its own code☆393Jun 28, 2025Updated 10 months ago
- Process reimaging proof of concept code☆97Jun 21, 2019Updated 6 years ago
- RAT And C&C Resources. 250+ Open Source Projects, 1200+ RAT/C&C blog/video.☆2,194Feb 17, 2020Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆94Nov 1, 2018Updated 7 years ago
- ☆141Nov 24, 2025Updated 5 months ago
- Toolset for research malware and Cobalt Strike beacons☆211Mar 11, 2025Updated last year
- DrSemu - Sandboxed Malware Detection and Classification Tool Based on Dynamic Behavior☆281Nov 3, 2019Updated 6 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- APT34/OILRIG leak☆232Apr 17, 2019Updated 7 years ago
- Simple little rootkit made in C☆13Feb 15, 2021Updated 5 years ago
- lateral movement techniques that can be used during red team exercises☆278Jan 13, 2020Updated 6 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆543Apr 14, 2021Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- AntiVirus Evasion Tool☆1,751Apr 23, 2025Updated last year
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆514Aug 6, 2019Updated 6 years ago
- A C# DLL to Dump LSA Secrets☆59Feb 5, 2018Updated 8 years ago
- Create a powershell malware loader to run C#.cs code on runtime☆63Aug 17, 2019Updated 6 years ago
- Also known by Microsoft as Knifecoat☆1,148Dec 22, 2022Updated 3 years ago
- Client of Richkware-Manager-Server, that obtains list of all hosts and is able to send commands to do at each of them.☆13Dec 28, 2025Updated 4 months ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆44Oct 30, 2019Updated 6 years ago