Skip to content
#

trojan

Here are 20 public repositories matching this topic...

TheFatRat

Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…

  • Updated Mar 17, 2024
  • C

A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (POWERSHELL) FROM THE VICTIM MACHINE TO THE ATTACKER CONSOLE , OVER LAN AND WAN.

  • Updated Jun 4, 2019
  • C
ADR

ADR is a trojan that retrieves all information on the computer and all data stored in applications using chormuim. It recovers cookies, tokens, passwords and saved bank cards. This malware is undetectable by Windows Defender, Chrome, Virustotal (4/71).

  • Updated Sep 5, 2023
  • C

Trojans generally spread by some form of social engineering; for example, where a user is duped into executing an email attachment disguised to appear innocuous (e.g., a routine form to be filled in), or by clicking on some fake advertisement on social media or anywhere else. Although their payload can be anything, many modern forms act as a bac…

  • Updated Jun 23, 2023
  • C

Improve this page

Add a description, image, and links to the trojan topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the trojan topic, visit your repo's landing page and select "manage topics."

Learn more