GitHub topics: trojan-builder
Vadelarez/Batch-Downloader-Crypter-FUD-UAC-Bypass
Crypter encrypts malware to evade detection, often paired with FUD or UAC bypass techniques. Batch files serve as malware downloaders or trojans, created using builders. Tools like batch crypter or fud crypter ensure stealth.
Language: Visual Basic .NET - Size: 24.1 MB - Last synced at: about 20 hours ago - Pushed at: about 21 hours ago - Stars: 0 - Forks: 0

Vadelarez/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass
Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.
Language: Visual Basic .NET - Size: 13.9 MB - Last synced at: about 20 hours ago - Pushed at: about 21 hours ago - Stars: 0 - Forks: 0

Tarekmets/Exe-UacBypass-Downloader-Crypter-Fud-Defender-Malware-Executable
Malware builders create hidden trojans with features like UAC bypass and defender bypass. Tools like crypters and FUD ensure antivirus evasion, while shellcode and memory exclusion enhance stealth.
Language: Visual Basic .NET - Size: 14.4 MB - Last synced at: 4 days ago - Pushed at: 4 days ago - Stars: 0 - Forks: 0

Tarekmets/Phantom-Dropper-WebBased-Chrome-Bypas-Fud-Runtime-Native
Trojan builders focus on creating hidden malware with downloader and encryption capabilities. Assembly changers and mutex features ensure uniqueness, while RAT clients provide remote access to infected systems.
Language: Visual Basic .NET - Size: 13 MB - Last synced at: 4 days ago - Pushed at: 4 days ago - Stars: 0 - Forks: 0

Tarekmets/Exe-To-Batch-Convert
RAT tools and malware builders generate trojan clients with hidden startup and encryption. Features like assembly changers and mutex improve stealth, while downloader modules ensure additional payloads are fetched securely.
Language: Visual Basic .NET - Size: 13 MB - Last synced at: 4 days ago - Pushed at: 4 days ago - Stars: 0 - Forks: 0

Tarekmets/Exe-To-Base64-ShellCode-Convert
Hidden malware uses techniques like UAC bypass and antivirus bypass to avoid detection. Crypters and shellcode loaders help deploy FUD payloads, while memory exclusion ensures smooth execution without interference.
Language: Visual Basic .NET - Size: 62.5 KB - Last synced at: 4 days ago - Pushed at: 4 days ago - Stars: 0 - Forks: 0

Morsmalleo/AhMyth
Cross-Platform Android Remote Administration Tool | Official maintained repository for the AhMyth R.A.T Project | A dedicated revival of the original repository at https://GitHub.com/AhMyth/AhMyth-Android-RAT
Language: Smali - Size: 273 MB - Last synced at: 25 days ago - Pushed at: 25 days ago - Stars: 1,021 - Forks: 260

Taowmw/Batch-Downloader-Crypter-FUD-UAC-Bypass
Crypter encrypts malware to evade detection, often paired with FUD or UAC bypass techniques. Batch files serve as malware downloaders or trojans, created using builders. Tools like batch crypter or fud crypter ensure stealth.
Language: Visual Basic .NET - Size: 24.4 MB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 1

Taowmw/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass
Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.
Language: Visual Basic .NET - Size: 14.1 MB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

ussaeedx/xwormrat
XWorm is a RAT granting unauthorized system control. Features keylogging, screen capture, file manipulation, webcam/mic access, and remote command execution. Spreads via phishing or exploits. Uses C&C servers for data exfiltration. Modular design with plugins enhances stealth and adaptability.
Size: 1000 Bytes - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 3 - Forks: 0

Taanozm/Phantom-Dropper-WebBased-Chrome-Bypas-Fud-Runtime-Native
Trojan builders focus on creating hidden malware with downloader and encryption capabilities. Assembly changers and mutex features ensure uniqueness, while RAT clients provide remote access to infected systems.
Language: Visual Basic .NET - Size: 12.4 MB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

Taanozm/Exe-UacBypass-Downloader-Crypter-Fud-Defender-Malware-Executable
Malware builders create hidden trojans with features like UAC bypass and defender bypass. Tools like crypters and FUD ensure antivirus evasion, while shellcode and memory exclusion enhance stealth.
Language: Visual Basic .NET - Size: 14.5 MB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

Taanozm/Exe-To-Batch-Convert
RAT tools and malware builders generate trojan clients with hidden startup and encryption. Features like assembly changers and mutex improve stealth, while downloader modules ensure additional payloads are fetched securely.
Language: Visual Basic .NET - Size: 12.4 MB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 1

johnlass09/Batch-Downloader-Crypter-FUD-UAC-Bypass
Batch-Downloader-Crypter-FUD-UAC-Bypass offers tools for script obfuscation and encryption, enhancing security against reverse engineering. 🛡️🔒
Language: Visual Basic .NET - Size: 23.8 MB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 0 - Forks: 0

Black-Hell-Team/TheBhTiNjector
TheBhTiNjector is a filebinder that can concatenate two or more files of some extensions that preserves the integrity of the files and gives you the option of injecting shellcode into them.
Language: Assembly - Size: 369 KB - Last synced at: 30 days ago - Pushed at: 11 months ago - Stars: 14 - Forks: 6

Reazmx/Exe-To-Batch-Convert
RAT tools and malware builders generate trojan clients with hidden startup and encryption. Features like assembly changers and mutex improve stealth, while downloader modules ensure additional payloads are fetched securely.
Language: Visual Basic .NET - Size: 12.7 MB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 0 - Forks: 0

Reazmx/Exe-UacBypass-Downloader-Crypter-Fud-Defender-Malware-Executable
Malware builders create hidden trojans with features like UAC bypass and defender bypass. Tools like crypters and FUD ensure antivirus evasion, while shellcode and memory exclusion enhance stealth.
Language: Visual Basic .NET - Size: 14.8 MB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 0 - Forks: 0

Reazmx/Phantom-Dropper-WebBased-Chrome-Bypas-Fud-Runtime-Native
Trojan builders focus on creating hidden malware with downloader and encryption capabilities. Assembly changers and mutex features ensure uniqueness, while RAT clients provide remote access to infected systems.
Language: Visual Basic .NET - Size: 12.6 MB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 1 - Forks: 0

Reazmx/Exe-To-Base64-ShellCode-Convert
Hidden malware uses techniques like UAC bypass and antivirus bypass to avoid detection. Crypters and shellcode loaders help deploy FUD payloads, while memory exclusion ensures smooth execution without interference.
Language: Visual Basic .NET - Size: 388 KB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 1 - Forks: 0

metadasystem33/metadasystem33
Config files for my GitHub profile.https://github.com/bournius93
Size: 12.7 KB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 1 - Forks: 0

Theinxm/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass
Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.
Language: Visual Basic .NET - Size: 13.9 MB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 0 - Forks: 0

Theinxm/Batch-Downloader-Crypter-FUD-UAC-Bypass
Crypter encrypts malware to evade detection, often paired with FUD or UAC bypass techniques. Batch files serve as malware downloaders or trojans, created using builders. Tools like batch crypter or fud crypter ensure stealth.
Language: Visual Basic .NET - Size: 24.1 MB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 0 - Forks: 0

linzhxin/lzhxin
Ich versuche alles zu schaffen was ich kann
Size: 34.2 KB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 0 - Forks: 0

Feanrodash/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass
Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.
Language: Visual Basic .NET - Size: 13.9 MB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 0 - Forks: 0

Feanrodash/Batch-Downloader-Crypter-FUD-UAC-Bypass
Crypter encrypts malware to evade detection, often paired with FUD or UAC bypass techniques. Batch files serve as malware downloaders or trojans, created using builders. Tools like batch crypter or fud crypter ensure stealth.
Language: Visual Basic .NET - Size: 24.2 MB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 0 - Forks: 0

MaszkKrty/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass
Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.
Language: Visual Basic .NET - Size: 14.5 MB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 0 - Forks: 0

MaszkKrty/Batch-Downloader-Crypter-FUD-UAC-Bypass
Crypter encrypts malware to evade detection, often paired with FUD or UAC bypass techniques. Batch files serve as malware downloaders or trojans, created using builders. Tools like batch crypter or fud crypter ensure stealth.
Language: Visual Basic .NET - Size: 24.7 MB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 0 - Forks: 0

DieFrikadelle/my-priv.-RAT-collection
This is my private RAT collection, i want to share.
Size: 551 MB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 13 - Forks: 1

ELMERIKH/DSC2
Discord based C2
Language: Python - Size: 248 KB - Last synced at: 9 days ago - Pushed at: over 1 year ago - Stars: 3 - Forks: 0

Ohiaras/Exe-To-Batch-Convert
RAT tools and malware builders generate trojan clients with hidden startup and encryption. Features like assembly changers and mutex improve stealth, while downloader modules ensure additional payloads are fetched securely.
Language: Visual Basic .NET - Size: 13 MB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 0 - Forks: 0

Ohiaras/Exe-To-Base64-ShellCode-Convert
Hidden malware uses techniques like UAC bypass and antivirus bypass to avoid detection. Crypters and shellcode loaders help deploy FUD payloads, while memory exclusion ensures smooth execution without interference.
Language: Visual Basic .NET - Size: 51.8 KB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 0 - Forks: 0

Ohiaras/Phantom-Dropper-WebBased-Chrome-Bypas-Fud-Runtime-Native
Trojan builders focus on creating hidden malware with downloader and encryption capabilities. Assembly changers and mutex features ensure uniqueness, while RAT clients provide remote access to infected systems.
Language: Visual Basic .NET - Size: 0 Bytes - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 0 - Forks: 0

Ohiaras/Exe-UacBypass-Downloader-Crypter-Fud-Defender-Malware-Executable
Malware builders create hidden trojans with features like UAC bypass and defender bypass. Tools like crypters and FUD ensure antivirus evasion, while shellcode and memory exclusion enhance stealth.
Language: Visual Basic .NET - Size: 0 Bytes - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 1 - Forks: 0

Huyqia/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass
Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.
Language: Visual Basic .NET - Size: 14.5 MB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 0 - Forks: 0

Huyqia/Batch-Downloader-Crypter-FUD-UAC-Bypass
Crypter encrypts malware to evade detection, often paired with FUD or UAC bypass techniques. Batch files serve as malware downloaders or trojans, created using builders. Tools like batch crypter or fud crypter ensure stealth.
Language: Visual Basic .NET - Size: 24.7 MB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 0 - Forks: 0

Orshity/Batch-Downloader-Crypter-FUD-UAC-Bypass
Crypter encrypts malware to evade detection, often paired with FUD or UAC bypass techniques. Batch files serve as malware downloaders or trojans, created using builders. Tools like batch crypter or fud crypter ensure stealth.
Language: Visual Basic .NET - Size: 24.1 MB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 0 - Forks: 0

Orshity/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass
Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.
Language: Visual Basic .NET - Size: 13.9 MB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 0 - Forks: 0

Kartiean/Exe-To-Batch-Convert
RAT tools and malware builders generate trojan clients with hidden startup and encryption. Features like assembly changers and mutex improve stealth, while downloader modules ensure additional payloads are fetched securely.
Language: Visual Basic .NET - Size: 12.4 MB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 0 - Forks: 0

Kartiean/Exe-To-Base64-ShellCode-Convert
Hidden malware uses techniques like UAC bypass and antivirus bypass to avoid detection. Crypters and shellcode loaders help deploy FUD payloads, while memory exclusion ensures smooth execution without interference.
Language: Visual Basic .NET - Size: 134 KB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 0 - Forks: 0

Kartiean/Exe-UACBypass-Downloader-Crypter-Fud-Defender-Malware-Executable
Malware builders create hidden trojans with features like UAC bypass and defender bypass. Tools like crypters and FUD ensure antivirus evasion, while shellcode and memory exclusion enhance stealth.
Language: Visual Basic .NET - Size: 14.5 MB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 1 - Forks: 0

anonymousjer023/Exe-UACBypass-Downloader-Crypter-Fud-Defender-Malware-Executable
Malware builders create hidden trojans with features like UAC bypass and defender bypass. Tools like crypters and FUD ensure antivirus evasion, while shellcode and memory exclusion enhance stealth.
Language: Visual Basic .NET - Size: 13.9 MB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 0 - Forks: 0

Raisots/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass
Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.
Language: Visual Basic .NET - Size: 14.5 MB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 0 - Forks: 0

Raisots/Batch-Downloader-Crypter-FUD-UAC-Bypass
Crypter encrypts malware to evade detection, often paired with FUD or UAC bypass techniques. Batch files serve as malware downloaders or trojans, created using builders. Tools like batch crypter or fud crypter ensure stealth.
Language: Visual Basic .NET - Size: 24.7 MB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 0 - Forks: 0

adrianlois/Troyano-VB6-PoC
Prueba de concepto de un troyano simple desarrollado en Visual Basic 6.0
Language: Visual Basic 6.0 - Size: 237 KB - Last synced at: 6 months ago - Pushed at: 8 months ago - Stars: 3 - Forks: 1

BlackXZ0one/Craxsrat-V7.2
Android Rat ( Craxsrat V7 ) Source Code
Size: 3.91 KB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 3 - Forks: 0

LotusRemote/LotusRAT-With-Ransomware-Worm-Capabilities
New RAT With ransomware + worm abilities
Size: 18.8 MB - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 1 - Forks: 0

LotusTrojan/LotusRAT
RAT with worm and ransomware capabilities.
Size: 28.3 MB - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 2 - Forks: 1

MrShadowDev/doenerium
Fully Undetected Grabber (Grabs Wallets, Passwords, Cookies, Modifies Discord Client Etc.)
Language: JavaScript - Size: 1.41 MB - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 8 - Forks: 5

termuxhackers-id/SARA
SARA - Simple Android Ransomware Attack
Language: Python - Size: 15.5 MB - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 248 - Forks: 51

4btin/SpyNote-v6.4
SpyNote V6.4 Android Trojan
Size: 21 MB - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 0 - Forks: 0

Ledear-dev/Android-Ransomware-Builder
Android Ransomware Builder 2023 FUD 100% Undetectable
Size: 1000 Bytes - Last synced at: over 2 years ago - Pushed at: over 2 years ago - Stars: 0 - Forks: 0

ChimesOfDestruction/SRC-njRAT-0.7d-Platinum-Edition
Best version of njRAT with SRC. ;)
Language: Visual Basic .NET - Size: 52 MB - Last synced at: over 2 years ago - Pushed at: over 2 years ago - Stars: 16 - Forks: 5

AD33ON/VENOM-RAT-HVNC-5.6
🕷 A quality remote administration tool was the top request we had from our macro exploit users, and that's how Venom Software was born. There's no easier way to spread your exploit in any environment, and take advantage of remote file management & registry / command access.
Size: 1.95 KB - Last synced at: over 2 years ago - Pushed at: over 2 years ago - Stars: 50 - Forks: 0

Recol111/TheMurkStealer
Open source turbo stealer written on Python, all logs will be sent using discord webhooks.
Size: 0 Bytes - Last synced at: over 2 years ago - Pushed at: over 2 years ago - Stars: 61 - Forks: 0

sent3xced/VENOM-RAT-HVNC-5.6
VENOM RAT HVNC (remote administration tool, hvnc rat)
Size: 1000 Bytes - Last synced at: over 2 years ago - Pushed at: over 2 years ago - Stars: 1 - Forks: 0

ChimesOfDestruction/Crypters-Source-Collection
SRC Collection: Autoit, Delphi, .NET, VB6, C++ and more.
Size: 150 MB - Last synced at: over 2 years ago - Pushed at: over 2 years ago - Stars: 1 - Forks: 0

Pyran1/RAT-Collection
Remote Access Trojan collection.(260+ RAT-Builders!)
Size: 1000 MB - Last synced at: over 2 years ago - Pushed at: over 3 years ago - Stars: 86 - Forks: 16

ShareToolsForFree/Babylon-RAT-1.7.0.0
Remote Trojan
Size: 0 Bytes - Last synced at: over 2 years ago - Pushed at: over 2 years ago - Stars: 1 - Forks: 0

ShareToolsForFree/Revenge-RAT-V0.3
Remote Trojan
Language: AutoIt - Size: 0 Bytes - Last synced at: over 2 years ago - Pushed at: over 2 years ago - Stars: 1 - Forks: 0

ShareToolsForFree/Hunting-Bitches-V1.0
Remote Trojan
Size: 0 Bytes - Last synced at: over 2 years ago - Pushed at: over 2 years ago - Stars: 1 - Forks: 0
