xlinshan / Coldroot
Mac OS Trojan (RAT) made with love <3
☆91Updated 9 years ago
Alternatives and similar repositories for Coldroot:
Users that are interested in Coldroot are comparing it to the libraries listed below
- Exploitkit☆184Updated 8 years ago
- Better Remote Access Trojan☆49Updated 8 years ago
- Carberp Banking Trojan☆113Updated 10 years ago
- Malicious Software SRC Extract☆72Updated 8 years ago
- Tinba Banking Trojan☆84Updated 10 years ago
- Alina Spark - Point of Sales Trojan☆46Updated 10 years ago
- A Powershell exploit service that opens a reverse http connection via meterpreter☆117Updated 2 years ago
- ARCANUS is a customized payload generator/handler.☆144Updated 7 years ago
- XtremeRAT SRC Extract☆57Updated 8 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆127Updated 8 years ago
- Personal collection of Remote Administration Tool sources. Dedicated for Ax0nes Forum at Ax0nes.com for education purpose☆78Updated 7 years ago
- Example Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic leve…☆71Updated 5 years ago
- Tool for easy clean PE32 from AV signature☆27Updated 8 years ago
- Keylogger Code In C++ Will Work On Window 7, 8, 8.1, And 10☆78Updated 6 years ago
- Experimental examples of Ransomware in different languages☆37Updated 7 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆150Updated 6 years ago
- Code examples from recent blog posts by minerva labs.☆45Updated 6 years ago
- Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.☆21Updated 8 years ago
- Clone of hidden tear written in C++☆69Updated 4 years ago
- Linux RDP Scanner and Bruteforcer Scripts☆61Updated 9 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆76Updated 8 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆225Updated 3 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆50Updated 8 years ago
- Zero-Day Code Injection and Persistence Technique☆26Updated 8 years ago
- Power Loader botnet☆39Updated 10 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆61Updated 10 years ago
- Simple Remote Access Trojan☆21Updated 8 years ago
- A ctypes powered python keylogger.☆105Updated 5 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆58Updated 8 years ago
- RAT Museum☆105Updated 2 years ago