An open API service providing repository metadata for many open source software ecosystems.

GitHub topics: trojan-builder

Reazmx/Exe-UacBypass-Downloader-Crypter-Fud-Defender-Malware-Executable

Malware builders create hidden trojans with features like UAC bypass and defender bypass. Tools like crypters and FUD ensure antivirus evasion, while shellcode and memory exclusion enhance stealth.

Language: Visual Basic .NET - Size: 14.5 MB - Last synced at: 4 days ago - Pushed at: 4 days ago - Stars: 0 - Forks: 0

Reazmx/Exe-To-Batch-Convert

RAT tools and malware builders generate trojan clients with hidden startup and encryption. Features like assembly changers and mutex improve stealth, while downloader modules ensure additional payloads are fetched securely.

Language: Visual Basic .NET - Size: 12.4 MB - Last synced at: 4 days ago - Pushed at: 4 days ago - Stars: 0 - Forks: 0

Reazmx/Exe-To-Base64-ShellCode-Convert

Hidden malware uses techniques like UAC bypass and antivirus bypass to avoid detection. Crypters and shellcode loaders help deploy FUD payloads, while memory exclusion ensures smooth execution without interference.

Language: Visual Basic .NET - Size: 129 KB - Last synced at: 4 days ago - Pushed at: 4 days ago - Stars: 0 - Forks: 0

Reazmx/Phantom-Dropper-WebBased-Chrome-Bypas-Fud-Runtime-Native

Trojan builders focus on creating hidden malware with downloader and encryption capabilities. Assembly changers and mutex features ensure uniqueness, while RAT clients provide remote access to infected systems.

Language: Visual Basic .NET - Size: 12.4 MB - Last synced at: 4 days ago - Pushed at: 4 days ago - Stars: 0 - Forks: 0

Feanrodash/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass

Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.

Language: Visual Basic .NET - Size: 14.5 MB - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 0 - Forks: 0

Feanrodash/Batch-Downloader-Crypter-FUD-UAC-Bypass

Crypter encrypts malware to evade detection, often paired with FUD or UAC bypass techniques. Batch files serve as malware downloaders or trojans, created using builders. Tools like batch crypter or fud crypter ensure stealth.

Language: Visual Basic .NET - Size: 24.7 MB - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 0 - Forks: 0

Morsmalleo/AhMyth

Cross-Platform Android Remote Administration Tool | Official maintained repository for the AhMyth R.A.T Project | A dedicated revival of the original repository at https://GitHub.com/AhMyth/AhMyth-Android-RAT

Language: Smali - Size: 273 MB - Last synced at: 10 days ago - Pushed at: 10 days ago - Stars: 947 - Forks: 229

MaszkKrty/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass

Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.

Language: Visual Basic .NET - Size: 14.5 MB - Last synced at: 11 days ago - Pushed at: 11 days ago - Stars: 0 - Forks: 0

MaszkKrty/Batch-Downloader-Crypter-FUD-UAC-Bypass

Crypter encrypts malware to evade detection, often paired with FUD or UAC bypass techniques. Batch files serve as malware downloaders or trojans, created using builders. Tools like batch crypter or fud crypter ensure stealth.

Language: Visual Basic .NET - Size: 24.7 MB - Last synced at: 11 days ago - Pushed at: 11 days ago - Stars: 0 - Forks: 0

DieFrikadelle/my-priv.-RAT-collection

This is my private RAT collection, i want to share.

Size: 551 MB - Last synced at: 17 days ago - Pushed at: 17 days ago - Stars: 13 - Forks: 1

Ohiaras/Exe-To-Batch-Convert

RAT tools and malware builders generate trojan clients with hidden startup and encryption. Features like assembly changers and mutex improve stealth, while downloader modules ensure additional payloads are fetched securely.

Language: Visual Basic .NET - Size: 13 MB - Last synced at: 18 days ago - Pushed at: 18 days ago - Stars: 0 - Forks: 0

Ohiaras/Exe-To-Base64-ShellCode-Convert

Hidden malware uses techniques like UAC bypass and antivirus bypass to avoid detection. Crypters and shellcode loaders help deploy FUD payloads, while memory exclusion ensures smooth execution without interference.

Language: Visual Basic .NET - Size: 51.8 KB - Last synced at: 18 days ago - Pushed at: 18 days ago - Stars: 0 - Forks: 0

Ohiaras/Phantom-Dropper-WebBased-Chrome-Bypas-Fud-Runtime-Native

Trojan builders focus on creating hidden malware with downloader and encryption capabilities. Assembly changers and mutex features ensure uniqueness, while RAT clients provide remote access to infected systems.

Language: Visual Basic .NET - Size: 0 Bytes - Last synced at: 18 days ago - Pushed at: 18 days ago - Stars: 0 - Forks: 0

Ohiaras/Exe-UacBypass-Downloader-Crypter-Fud-Defender-Malware-Executable

Malware builders create hidden trojans with features like UAC bypass and defender bypass. Tools like crypters and FUD ensure antivirus evasion, while shellcode and memory exclusion enhance stealth.

Language: Visual Basic .NET - Size: 0 Bytes - Last synced at: 18 days ago - Pushed at: 18 days ago - Stars: 1 - Forks: 0

Huyqia/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass

Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.

Language: Visual Basic .NET - Size: 14.5 MB - Last synced at: 18 days ago - Pushed at: 18 days ago - Stars: 0 - Forks: 0

Huyqia/Batch-Downloader-Crypter-FUD-UAC-Bypass

Crypter encrypts malware to evade detection, often paired with FUD or UAC bypass techniques. Batch files serve as malware downloaders or trojans, created using builders. Tools like batch crypter or fud crypter ensure stealth.

Language: Visual Basic .NET - Size: 24.7 MB - Last synced at: 18 days ago - Pushed at: 18 days ago - Stars: 0 - Forks: 0

Orshity/Batch-Downloader-Crypter-FUD-UAC-Bypass

Crypter encrypts malware to evade detection, often paired with FUD or UAC bypass techniques. Batch files serve as malware downloaders or trojans, created using builders. Tools like batch crypter or fud crypter ensure stealth.

Language: Visual Basic .NET - Size: 24.1 MB - Last synced at: 25 days ago - Pushed at: 25 days ago - Stars: 0 - Forks: 0

Orshity/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass

Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.

Language: Visual Basic .NET - Size: 13.9 MB - Last synced at: 25 days ago - Pushed at: 25 days ago - Stars: 0 - Forks: 0

Kartiean/Exe-To-Batch-Convert

RAT tools and malware builders generate trojan clients with hidden startup and encryption. Features like assembly changers and mutex improve stealth, while downloader modules ensure additional payloads are fetched securely.

Language: Visual Basic .NET - Size: 12.4 MB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

Kartiean/Exe-To-Base64-ShellCode-Convert

Hidden malware uses techniques like UAC bypass and antivirus bypass to avoid detection. Crypters and shellcode loaders help deploy FUD payloads, while memory exclusion ensures smooth execution without interference.

Language: Visual Basic .NET - Size: 134 KB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

Kartiean/Exe-UACBypass-Downloader-Crypter-Fud-Defender-Malware-Executable

Malware builders create hidden trojans with features like UAC bypass and defender bypass. Tools like crypters and FUD ensure antivirus evasion, while shellcode and memory exclusion enhance stealth.

Language: Visual Basic .NET - Size: 14.5 MB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 1 - Forks: 0

Kartiean/Phantom-Dropper-WebBased-Chrome-Bypass-Fud-Runtime-Native

Trojan builders focus on creating hidden malware with downloader and encryption capabilities. Assembly changers and mutex features ensure uniqueness, while RAT clients provide remote access to infected systems.

Language: Visual Basic .NET - Size: 12.4 MB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

anonymousjer023/Exe-UACBypass-Downloader-Crypter-Fud-Defender-Malware-Executable

Malware builders create hidden trojans with features like UAC bypass and defender bypass. Tools like crypters and FUD ensure antivirus evasion, while shellcode and memory exclusion enhance stealth.

Language: Visual Basic .NET - Size: 13.9 MB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

Raisots/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass

Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.

Language: Visual Basic .NET - Size: 14.5 MB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

Raisots/Batch-Downloader-Crypter-FUD-UAC-Bypass

Crypter encrypts malware to evade detection, often paired with FUD or UAC bypass techniques. Batch files serve as malware downloaders or trojans, created using builders. Tools like batch crypter or fud crypter ensure stealth.

Language: Visual Basic .NET - Size: 24.7 MB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

Black-Hell-Team/TheBhTiNjector

TheBhTiNjector is a filebinder that can concatenate two or more files of some extensions that preserves the integrity of the files and gives you the option of injecting shellcode into them.

Language: Assembly - Size: 369 KB - Last synced at: 28 days ago - Pushed at: 7 months ago - Stars: 11 - Forks: 4

adrianlois/Troyano-VB6-PoC

Prueba de concepto de un troyano simple desarrollado en Visual Basic 6.0

Language: Visual Basic 6.0 - Size: 237 KB - Last synced at: 2 months ago - Pushed at: 4 months ago - Stars: 3 - Forks: 1

ELMERIKH/DSC2

Discord based C2

Language: Python - Size: 248 KB - Last synced at: 2 months ago - Pushed at: over 1 year ago - Stars: 3 - Forks: 0

BlackXZ0one/Craxsrat-V7.2

Android Rat ( Craxsrat V7 ) Source Code

Size: 3.91 KB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 3 - Forks: 0

LotusRemote/LotusRAT-With-Ransomware-Worm-Capabilities

New RAT With ransomware + worm abilities

Size: 18.8 MB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 1 - Forks: 0

LotusTrojan/LotusRAT

RAT with worm and ransomware capabilities.

Size: 28.3 MB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 2 - Forks: 1

MrShadowDev/doenerium

Fully Undetected Grabber (Grabs Wallets, Passwords, Cookies, Modifies Discord Client Etc.)

Language: JavaScript - Size: 1.41 MB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 8 - Forks: 5

termuxhackers-id/SARA

SARA - Simple Android Ransomware Attack

Language: Python - Size: 15.5 MB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 248 - Forks: 51

4btin/SpyNote-v6.4

SpyNote V6.4 Android Trojan

Size: 21 MB - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 0 - Forks: 0

Ledear-dev/Android-Ransomware-Builder

Android Ransomware Builder 2023 FUD 100% Undetectable

Size: 1000 Bytes - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 0 - Forks: 0

ChimesOfDestruction/SRC-njRAT-0.7d-Platinum-Edition

Best version of njRAT with SRC. ;)

Language: Visual Basic .NET - Size: 52 MB - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 16 - Forks: 5

AD33ON/VENOM-RAT-HVNC-5.6

🕷 A quality remote administration tool was the top request we had from our macro exploit users, and that's how Venom Software was born. There's no easier way to spread your exploit in any environment, and take advantage of remote file management & registry / command access.

Size: 1.95 KB - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 50 - Forks: 0

Recol111/TheMurkStealer

Open source turbo stealer written on Python, all logs will be sent using discord webhooks.

Size: 0 Bytes - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 61 - Forks: 0

sent3xced/VENOM-RAT-HVNC-5.6

VENOM RAT HVNC (remote administration tool, hvnc rat)

Size: 1000 Bytes - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 1 - Forks: 0

ChimesOfDestruction/Crypters-Source-Collection

SRC Collection: Autoit, Delphi, .NET, VB6, C++ and more.

Size: 150 MB - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 1 - Forks: 0

Pyran1/RAT-Collection

Remote Access Trojan collection.(260+ RAT-Builders!)

Size: 1000 MB - Last synced at: about 2 years ago - Pushed at: about 3 years ago - Stars: 86 - Forks: 16

ShareToolsForFree/Babylon-RAT-1.7.0.0

Remote Trojan

Size: 0 Bytes - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 1 - Forks: 0

ShareToolsForFree/Revenge-RAT-V0.3

Remote Trojan

Language: AutoIt - Size: 0 Bytes - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 1 - Forks: 0

ShareToolsForFree/Hunting-Bitches-V1.0

Remote Trojan

Size: 0 Bytes - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 1 - Forks: 0