to1018rose / A-large-collection-of-TrojanLinks
A large collection of Troajn
☆34Updated 2 years ago
Alternatives and similar repositories for A-large-collection-of-Trojan
Users that are interested in A-large-collection-of-Trojan are comparing it to the libraries listed below
Sorting:
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆108Updated last year
- Here are +200 different rats some with source code☆103Updated last year
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆62Updated 3 years ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆22Updated 2 years ago
- A simple and efficent script to obfuscate python payloads to make it completely FUD☆36Updated last year
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆25Updated 2 years ago
- Simple Powershell Http shell With WEB UI☆72Updated 3 months ago
- Remcos RAT V3.8.0 Latest version☆32Updated 2 years ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆15Updated last year
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆78Updated last year
- 🔮 Python Remote administration tool via telegram☆52Updated 2 months ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆42Updated 2 years ago
- This repository contains a few leaked files of HookBot.☆104Updated last year
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆70Updated 11 months ago
- FIshShell is a multi-session handler and Windows & Linux backdoor payload generator. It allows users\targets to connect to the server (ot…☆8Updated last year
- Social Engineering Browser Update Attack.☆56Updated last year
- An ADB-based botnet written in C.☆44Updated 3 years ago
- A Fully Undectable RAT for Windows that bypass every kind of Antivirus Protections and will give u a CMD shell in your terminal☆48Updated last year
- Generate Undetectable Metasploit Payload in a simple way☆39Updated last year
- A collection of malwares found on the internet.☆62Updated 2 years ago
- Telegram video (mp4) extension manipulation PoC☆92Updated 4 months ago
- steal chrome saved passwords "undetectable"☆50Updated 3 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆30Updated last year
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability ass…☆37Updated this week
- Diamond Sorter is a AIO - Stealer Log Utility for checking, sorting, and cleaning Combolists, Stealer Log Cookies, Autofill Text data and…☆39Updated last year
- A simple script to obfuscate batch(bat) code easily☆24Updated last year
- You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best…☆80Updated 2 months ago
- Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)☆32Updated 3 years ago
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆116Updated 2 months ago
- This is power full BotNet☆41Updated last year