Hidden VNC constitutes an ingenious stratagem harnessed by the most adept connoisseurs of technology. This method, by far, presents an exhilarating modality to govern the operation
-
Updated
Jun 29, 2024 - C
Hidden VNC constitutes an ingenious stratagem harnessed by the most adept connoisseurs of technology. This method, by far, presents an exhilarating modality to govern the operation
Following guides to learn the basics of building malware in C, for educational purposes.
Stealthy Windows keylogger written in C which uses a traditional approach to logging keystrokes (Does not utilise WinAPI hooks)
persistent windows backdoor with reverse shell
Add a description, image, and links to the remote-access-trojan topic page so that developers can more easily learn about it.
To associate your repository with the remote-access-trojan topic, visit your repo's landing page and select "manage topics."