threatland / TL-TROJANView external linksLinks
A collection of source code for various RATs, Stealers, and other Trojans.
☆451Aug 29, 2019Updated 6 years ago
Alternatives and similar repositories for TL-TROJAN
Users that are interested in TL-TROJAN are comparing it to the libraries listed below
Sorting:
- A collection of fraud related tools for research.☆150Aug 19, 2019Updated 6 years ago
- This repo contains scripts, frameworks, and other tools related to DDoS.☆36Aug 24, 2019Updated 6 years ago
- A collection of source code for various botnets.☆566Oct 9, 2019Updated 6 years ago
- Open Source C++ Crypter. AES-256 Bit Encryption, Virtual Machine Detection and Almost FUD☆130May 8, 2021Updated 4 years ago
- Generate a ms batch file and inject a files inside of it. When the batch is executed, the files are extracted and executed.☆21Oct 19, 2019Updated 6 years ago
- ☆43Aug 1, 2019Updated 6 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆724Dec 26, 2022Updated 3 years ago
- ☆42Aug 10, 2019Updated 6 years ago
- Self defense post module for metasploit☆17Aug 30, 2019Updated 6 years ago
- ☆138Nov 24, 2025Updated 2 months ago
- ☆93Nov 1, 2018Updated 7 years ago
- Debugger checks in 3 ways☆19Jan 25, 2018Updated 8 years ago
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆441Jul 10, 2024Updated last year
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆91Nov 9, 2019Updated 6 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- AntiVirus Evasion Tool☆1,740Apr 23, 2025Updated 9 months ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- APT34/OILRIG leak☆232Apr 17, 2019Updated 6 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆330Jul 7, 2023Updated 2 years ago
- Simple little rootkit made in C☆13Feb 15, 2021Updated 5 years ago
- APT34/OILRIG leak☆11Jun 25, 2019Updated 6 years ago
- Toolset for research malware and Cobalt Strike beacons☆211Mar 11, 2025Updated 11 months ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆513Aug 6, 2019Updated 6 years ago
- lateral movement techniques that can be used during red team exercises☆273Jan 13, 2020Updated 6 years ago
- Process reimaging proof of concept code☆97Jun 21, 2019Updated 6 years ago
- DrSemu - Sandboxed Malware Detection and Classification Tool Based on Dynamic Behavior☆278Nov 3, 2019Updated 6 years ago
- Simple 32/64-bit PEs loader.☆139Dec 19, 2018Updated 7 years ago
- BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.☆259Mar 6, 2025Updated 11 months ago
- Tool for injecting a "TCP Relay" managed assembly into an unmanaged process☆65May 24, 2019Updated 6 years ago
- PoC for persisting .NET payloads in Windows Notification Facility (WNF) state names using low-level Windows Kernel API calls.☆152Jun 3, 2019Updated 6 years ago
- Executable that mutates its own code☆392Jun 28, 2025Updated 7 months ago
- Create a powershell malware loader to run C#.cs code on runtime☆65Aug 17, 2019Updated 6 years ago
- Bypass UAC by abusing shell protocol handlers☆14Jul 12, 2021Updated 4 years ago
- External C2 Using IE COM Objects☆101Feb 24, 2019Updated 6 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆2,233Dec 27, 2023Updated 2 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆541Apr 14, 2021Updated 4 years ago
- A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux☆1,415Oct 3, 2020Updated 5 years ago
- Malware samples observed in the wild from time to time☆12Jul 29, 2019Updated 6 years ago