⛔🛡️ WeDefend - Monitor and Protect Windows from Remote Access Trojan
-
Updated
Jun 16, 2018 - Java
⛔🛡️ WeDefend - Monitor and Protect Windows from Remote Access Trojan
A Simple Java Remote Access Trojan with an included Listener
A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (POWERSHELL) FROM THE VICTIM MACHINE TO THE ATTACKER CONSOLE , OVER LAN AND WAN.
Windows/Linux - ReverseShellBackdoor Framework
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…
Python Remote Access Tool
Silent Screenshot Capture | Post Exploitation Payload | VB.NET
it is a trojan at least, half of it is 💀 See Readme
Stealth Kid RAT (SKR) is an open-source multi-platform Remote Access Trojan (RAT) written in C#. Released under MIT license. The SKR project is fully developed and tested on Debian GNU-Linux (Deb 9.8 "Stretch"). The RAT will soon be available on Windows platform by mid-2021.
Virus - Trojans - Worms - Malwares
Remote Access Trojan collection.(260+ RAT-Builders!)
A cross platform C2/post-exploitation framework.
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
FUD Linux Remote Access Trojan
FUD Windows Rat written in python, it will get updated every time someone buy the password
This repostiory contains the python code of command and control trojan which will be controlled from the GitHub repo which contains the configuration file where attacker can specify the task which trojan has to do in the victim machine and then upload the same content / file in the private gihub repository of the attacker.
Add a description, image, and links to the trojan-rat topic page so that developers can more easily learn about it.
To associate your repository with the trojan-rat topic, visit your repo's landing page and select "manage topics."