GitHub topics: trojan-builder
Reazmx/Exe-UacBypass-Downloader-Crypter-Fud-Defender-Malware-Executable
Malware builders create hidden trojans with features like UAC bypass and defender bypass. Tools like crypters and FUD ensure antivirus evasion, while shellcode and memory exclusion enhance stealth.
Language: Visual Basic .NET - Size: 14.5 MB - Last synced at: 4 days ago - Pushed at: 4 days ago - Stars: 0 - Forks: 0

Reazmx/Exe-To-Batch-Convert
RAT tools and malware builders generate trojan clients with hidden startup and encryption. Features like assembly changers and mutex improve stealth, while downloader modules ensure additional payloads are fetched securely.
Language: Visual Basic .NET - Size: 12.4 MB - Last synced at: 4 days ago - Pushed at: 4 days ago - Stars: 0 - Forks: 0

Reazmx/Exe-To-Base64-ShellCode-Convert
Hidden malware uses techniques like UAC bypass and antivirus bypass to avoid detection. Crypters and shellcode loaders help deploy FUD payloads, while memory exclusion ensures smooth execution without interference.
Language: Visual Basic .NET - Size: 129 KB - Last synced at: 4 days ago - Pushed at: 4 days ago - Stars: 0 - Forks: 0

Reazmx/Phantom-Dropper-WebBased-Chrome-Bypas-Fud-Runtime-Native
Trojan builders focus on creating hidden malware with downloader and encryption capabilities. Assembly changers and mutex features ensure uniqueness, while RAT clients provide remote access to infected systems.
Language: Visual Basic .NET - Size: 12.4 MB - Last synced at: 4 days ago - Pushed at: 4 days ago - Stars: 0 - Forks: 0

Feanrodash/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass
Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.
Language: Visual Basic .NET - Size: 14.5 MB - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 0 - Forks: 0

Feanrodash/Batch-Downloader-Crypter-FUD-UAC-Bypass
Crypter encrypts malware to evade detection, often paired with FUD or UAC bypass techniques. Batch files serve as malware downloaders or trojans, created using builders. Tools like batch crypter or fud crypter ensure stealth.
Language: Visual Basic .NET - Size: 24.7 MB - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 0 - Forks: 0

Morsmalleo/AhMyth
Cross-Platform Android Remote Administration Tool | Official maintained repository for the AhMyth R.A.T Project | A dedicated revival of the original repository at https://GitHub.com/AhMyth/AhMyth-Android-RAT
Language: Smali - Size: 273 MB - Last synced at: 10 days ago - Pushed at: 10 days ago - Stars: 947 - Forks: 229

MaszkKrty/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass
Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.
Language: Visual Basic .NET - Size: 14.5 MB - Last synced at: 11 days ago - Pushed at: 11 days ago - Stars: 0 - Forks: 0

MaszkKrty/Batch-Downloader-Crypter-FUD-UAC-Bypass
Crypter encrypts malware to evade detection, often paired with FUD or UAC bypass techniques. Batch files serve as malware downloaders or trojans, created using builders. Tools like batch crypter or fud crypter ensure stealth.
Language: Visual Basic .NET - Size: 24.7 MB - Last synced at: 11 days ago - Pushed at: 11 days ago - Stars: 0 - Forks: 0

DieFrikadelle/my-priv.-RAT-collection
This is my private RAT collection, i want to share.
Size: 551 MB - Last synced at: 17 days ago - Pushed at: 17 days ago - Stars: 13 - Forks: 1

Ohiaras/Exe-To-Batch-Convert
RAT tools and malware builders generate trojan clients with hidden startup and encryption. Features like assembly changers and mutex improve stealth, while downloader modules ensure additional payloads are fetched securely.
Language: Visual Basic .NET - Size: 13 MB - Last synced at: 18 days ago - Pushed at: 18 days ago - Stars: 0 - Forks: 0

Ohiaras/Exe-To-Base64-ShellCode-Convert
Hidden malware uses techniques like UAC bypass and antivirus bypass to avoid detection. Crypters and shellcode loaders help deploy FUD payloads, while memory exclusion ensures smooth execution without interference.
Language: Visual Basic .NET - Size: 51.8 KB - Last synced at: 18 days ago - Pushed at: 18 days ago - Stars: 0 - Forks: 0

Ohiaras/Phantom-Dropper-WebBased-Chrome-Bypas-Fud-Runtime-Native
Trojan builders focus on creating hidden malware with downloader and encryption capabilities. Assembly changers and mutex features ensure uniqueness, while RAT clients provide remote access to infected systems.
Language: Visual Basic .NET - Size: 0 Bytes - Last synced at: 18 days ago - Pushed at: 18 days ago - Stars: 0 - Forks: 0

Ohiaras/Exe-UacBypass-Downloader-Crypter-Fud-Defender-Malware-Executable
Malware builders create hidden trojans with features like UAC bypass and defender bypass. Tools like crypters and FUD ensure antivirus evasion, while shellcode and memory exclusion enhance stealth.
Language: Visual Basic .NET - Size: 0 Bytes - Last synced at: 18 days ago - Pushed at: 18 days ago - Stars: 1 - Forks: 0

Huyqia/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass
Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.
Language: Visual Basic .NET - Size: 14.5 MB - Last synced at: 18 days ago - Pushed at: 18 days ago - Stars: 0 - Forks: 0

Huyqia/Batch-Downloader-Crypter-FUD-UAC-Bypass
Crypter encrypts malware to evade detection, often paired with FUD or UAC bypass techniques. Batch files serve as malware downloaders or trojans, created using builders. Tools like batch crypter or fud crypter ensure stealth.
Language: Visual Basic .NET - Size: 24.7 MB - Last synced at: 18 days ago - Pushed at: 18 days ago - Stars: 0 - Forks: 0

Orshity/Batch-Downloader-Crypter-FUD-UAC-Bypass
Crypter encrypts malware to evade detection, often paired with FUD or UAC bypass techniques. Batch files serve as malware downloaders or trojans, created using builders. Tools like batch crypter or fud crypter ensure stealth.
Language: Visual Basic .NET - Size: 24.1 MB - Last synced at: 25 days ago - Pushed at: 25 days ago - Stars: 0 - Forks: 0

Orshity/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass
Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.
Language: Visual Basic .NET - Size: 13.9 MB - Last synced at: 25 days ago - Pushed at: 25 days ago - Stars: 0 - Forks: 0

Kartiean/Exe-To-Batch-Convert
RAT tools and malware builders generate trojan clients with hidden startup and encryption. Features like assembly changers and mutex improve stealth, while downloader modules ensure additional payloads are fetched securely.
Language: Visual Basic .NET - Size: 12.4 MB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

Kartiean/Exe-To-Base64-ShellCode-Convert
Hidden malware uses techniques like UAC bypass and antivirus bypass to avoid detection. Crypters and shellcode loaders help deploy FUD payloads, while memory exclusion ensures smooth execution without interference.
Language: Visual Basic .NET - Size: 134 KB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

Kartiean/Exe-UACBypass-Downloader-Crypter-Fud-Defender-Malware-Executable
Malware builders create hidden trojans with features like UAC bypass and defender bypass. Tools like crypters and FUD ensure antivirus evasion, while shellcode and memory exclusion enhance stealth.
Language: Visual Basic .NET - Size: 14.5 MB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 1 - Forks: 0

Kartiean/Phantom-Dropper-WebBased-Chrome-Bypass-Fud-Runtime-Native
Trojan builders focus on creating hidden malware with downloader and encryption capabilities. Assembly changers and mutex features ensure uniqueness, while RAT clients provide remote access to infected systems.
Language: Visual Basic .NET - Size: 12.4 MB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

anonymousjer023/Exe-UACBypass-Downloader-Crypter-Fud-Defender-Malware-Executable
Malware builders create hidden trojans with features like UAC bypass and defender bypass. Tools like crypters and FUD ensure antivirus evasion, while shellcode and memory exclusion enhance stealth.
Language: Visual Basic .NET - Size: 13.9 MB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

Raisots/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass
Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.
Language: Visual Basic .NET - Size: 14.5 MB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

Raisots/Batch-Downloader-Crypter-FUD-UAC-Bypass
Crypter encrypts malware to evade detection, often paired with FUD or UAC bypass techniques. Batch files serve as malware downloaders or trojans, created using builders. Tools like batch crypter or fud crypter ensure stealth.
Language: Visual Basic .NET - Size: 24.7 MB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

Black-Hell-Team/TheBhTiNjector
TheBhTiNjector is a filebinder that can concatenate two or more files of some extensions that preserves the integrity of the files and gives you the option of injecting shellcode into them.
Language: Assembly - Size: 369 KB - Last synced at: 28 days ago - Pushed at: 7 months ago - Stars: 11 - Forks: 4

adrianlois/Troyano-VB6-PoC
Prueba de concepto de un troyano simple desarrollado en Visual Basic 6.0
Language: Visual Basic 6.0 - Size: 237 KB - Last synced at: 2 months ago - Pushed at: 4 months ago - Stars: 3 - Forks: 1

ELMERIKH/DSC2
Discord based C2
Language: Python - Size: 248 KB - Last synced at: 2 months ago - Pushed at: over 1 year ago - Stars: 3 - Forks: 0

BlackXZ0one/Craxsrat-V7.2
Android Rat ( Craxsrat V7 ) Source Code
Size: 3.91 KB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 3 - Forks: 0

LotusRemote/LotusRAT-With-Ransomware-Worm-Capabilities
New RAT With ransomware + worm abilities
Size: 18.8 MB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 1 - Forks: 0

LotusTrojan/LotusRAT
RAT with worm and ransomware capabilities.
Size: 28.3 MB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 2 - Forks: 1

MrShadowDev/doenerium
Fully Undetected Grabber (Grabs Wallets, Passwords, Cookies, Modifies Discord Client Etc.)
Language: JavaScript - Size: 1.41 MB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 8 - Forks: 5

termuxhackers-id/SARA
SARA - Simple Android Ransomware Attack
Language: Python - Size: 15.5 MB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 248 - Forks: 51

4btin/SpyNote-v6.4
SpyNote V6.4 Android Trojan
Size: 21 MB - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 0 - Forks: 0

Ledear-dev/Android-Ransomware-Builder
Android Ransomware Builder 2023 FUD 100% Undetectable
Size: 1000 Bytes - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 0 - Forks: 0

ChimesOfDestruction/SRC-njRAT-0.7d-Platinum-Edition
Best version of njRAT with SRC. ;)
Language: Visual Basic .NET - Size: 52 MB - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 16 - Forks: 5

AD33ON/VENOM-RAT-HVNC-5.6
🕷 A quality remote administration tool was the top request we had from our macro exploit users, and that's how Venom Software was born. There's no easier way to spread your exploit in any environment, and take advantage of remote file management & registry / command access.
Size: 1.95 KB - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 50 - Forks: 0

Recol111/TheMurkStealer
Open source turbo stealer written on Python, all logs will be sent using discord webhooks.
Size: 0 Bytes - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 61 - Forks: 0

sent3xced/VENOM-RAT-HVNC-5.6
VENOM RAT HVNC (remote administration tool, hvnc rat)
Size: 1000 Bytes - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 1 - Forks: 0

ChimesOfDestruction/Crypters-Source-Collection
SRC Collection: Autoit, Delphi, .NET, VB6, C++ and more.
Size: 150 MB - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 1 - Forks: 0

Pyran1/RAT-Collection
Remote Access Trojan collection.(260+ RAT-Builders!)
Size: 1000 MB - Last synced at: about 2 years ago - Pushed at: about 3 years ago - Stars: 86 - Forks: 16

ShareToolsForFree/Babylon-RAT-1.7.0.0
Remote Trojan
Size: 0 Bytes - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 1 - Forks: 0

ShareToolsForFree/Revenge-RAT-V0.3
Remote Trojan
Language: AutoIt - Size: 0 Bytes - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 1 - Forks: 0

ShareToolsForFree/Hunting-Bitches-V1.0
Remote Trojan
Size: 0 Bytes - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 1 - Forks: 0
