Following guides to learn the basics of building malware in C, for educational purposes.
-
Updated
Oct 20, 2023 - C
Following guides to learn the basics of building malware in C, for educational purposes.
Hidden VNC constitutes an ingenious stratagem harnessed by the most adept connoisseurs of technology. This method, by far, presents an exhilarating modality to govern the operation
Stealthy Windows keylogger written in C which uses a traditional approach to logging keystrokes (Does not utilise WinAPI hooks)
persistent windows backdoor with reverse shell
Add a description, image, and links to the remote-access-trojan topic page so that developers can more easily learn about it.
To associate your repository with the remote-access-trojan topic, visit your repo's landing page and select "manage topics."