Repository navigation

#

trojan-malware

Cryakl/Ultimate-RAT-Collection

For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.

2442
5 天前

Process Hollowing demonstration & explanation

C++
35
4 年前

A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (POWERSHELL) FROM THE VICTIM MACHINE TO THE ATTACKER CONSOLE , OVER LAN AND WAN.

C
34
6 年前

⛔ 🛡️WeDefend- Monitor and Protect Android from Remote Access Trojan

Java
25
5 年前

This module uses the Metasploit framework built into Kali Linux to create a backdoor

Shell
13
4 年前

This repostiory contains the python code of command and control trojan which will be controlled from the GitHub repo which contains the configuration file where attacker can specify the task which trojan has to do in the victim machine and then upload the same content / file in the private gihub repository of the attacker.

Python
13
2 年前

Исходники той самой пилы

Pascal
9
2 年前

This is a python program backdoor embeded with a game for reverse connection from the victim to understand the use visit our youtube channel STRANGE LEARNINGS

Python
9
3 年前

This client-server project allows the client to recompile all the information from the Chrome, Edge and OperaGX browsers and then compresses it and send it to the server via TCP to the server, although it also has the option of doing so via Stmp, on the other hand the server allows decrypting all files, including passwords, cookies, etc

Python
7
2 年前

Finally, my new trojan called Filefy is now released publicly- for the first time ever! Feel free to test it on a virtual machine or record a video about it, but credit would be appreciated (as a relatively small creator). This is the version that's recoded in C, for an attempt to exclude the attempts of decompilation and removal of the warning. This is only for demostrational and educational purposes only, I, (itzsten) am not responsible for anything, whatsoever that you do with this malicious program. Don't use it for malicious purposes or you'll have a bad time at jail (not kidding).

5
3 年前
Batchfile
5
4 年前

A professional keylogger programmed with Python, C++ that is cross-platform containing good options

C++
4
4 个月前

FUD Windows Rat written in python, it will get updated every time someone buy the password

4
2 年前

Don't execute any samples without the necessary environment and the knowledge. The final user (you) are responsible for the use of this samples, be aware. The distribution of this samples is only for purposes of investigation and analysis.

3
3 年前