Linux/Windows post-exploitation framework made by linux user
-
Updated
Nov 23, 2024 - Go
Linux/Windows post-exploitation framework made by linux user
A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (POWERSHELL) FROM THE VICTIM MACHINE TO THE ATTACKER CONSOLE , OVER LAN AND WAN.
Process Hollowing demonstration & explanation
⛔ 🛡️WeDefend- Monitor and Protect Android from Remote Access Trojan
An opensource Prank Startup Malware for windows developed using C Programming Language.
This module uses the Metasploit framework built into Kali Linux to create a backdoor
This repostiory contains the python code of command and control trojan which will be controlled from the GitHub repo which contains the configuration file where attacker can specify the task which trojan has to do in the victim machine and then upload the same content / file in the private gihub repository of the attacker.
This is a python program backdoor embeded with a game for reverse connection from the victim to understand the use visit our youtube channel STRANGE LEARNINGS
A simple trojan made for Windows in Python.
This client-server project allows the client to recompile all the information from the Chrome, Edge and OperaGX browsers and then compresses it and send it to the server via TCP to the server, although it also has the option of doing so via Stmp, on the other hand the server allows decrypting all files, including passwords, cookies, etc
Malware created in batch and VBScript
Finally, my new trojan called Filefy is now released publicly- for the first time ever! Feel free to test it on a virtual machine or record a video about it, but credit would be appreciated (as a relatively small creator). This is the version that's recoded in C, for an attempt to exclude the attempts of decompilation and removal of the warning.…
it is a trojan at least, half of it is 💀 See Readme
Discord based C2
FUD Windows Rat written in python, it will get updated every time someone buy the password
In this repositiories you will get some intresting this but this should be use for fun or kidding. This method should not be performed at school , college , or any other public place.
Don't execute any samples without the necessary environment and the knowledge. The final user (you) are responsible for the use of this samples, be aware. The distribution of this samples is only for purposes of investigation and analysis.
Wordpress capable PHP backdoors
Add a description, image, and links to the trojan-malware topic page so that developers can more easily learn about it.
To associate your repository with the trojan-malware topic, visit your repo's landing page and select "manage topics."