You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softwโฆ
A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (POWERSHELL) FROM THE VICTIM MACHINE TO THE ATTACKER CONSOLE , OVER LAN AND WAN.
( TheFatRat_v2 ) Remote control access devices and exploiting tool, used as a deadly backdoor generator that bypass most anti virus software, penetrate a strong system such as Windows, MacOS, Android, and iOS
ADR is a trojan that retrieves all information on the computer and all data stored in applications using chormuim. It recovers cookies, tokens, passwords and saved bank cards. This malware is undetectable by Windows Defender, Chrome, Virustotal (4/71).
Given the increasing acceptance of online informations. This malware is often used to form botnets or enabling initial access for the Conti ransomware or Ryuk banking trojan. 7R0J4N is developed and operated by a sophisticated group of malicious cyber actors and has evolved into a highly modular, multi stage malware.
Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Thawne keeps checking if your File Exists on the System and is Running. If it's not running then Start it, If it does not exist or is removed Reinstall it.
this is it, ๐๐ฟ๐ฎ๐ ๐๐ฅ๐ฎ๐ is here. In the forum we've promise to share the iOS source code attack ( APK's ), but since this repo already published, we've would just kept it awhile, thank you for understanding.
reverse-TCP backdoor disguised within the netstat utility. It's designed to automatically exclude itself from the netstat output. (educational purposes only)
Trojans generally spread by some form of social engineering; for example, where a user is duped into executing an email attachment disguised to appear innocuous (e.g., a routine form to be filled in), or by clicking on some fake advertisement on social media or anywhere else. Although their payload can be anything, many modern forms act as a bacโฆ