For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.
-
Updated
Mar 28, 2025
For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
A cross platform C2/post-exploitation framework.
THorse is a RAT (Remote Administrator Trojan) Generator for Windows/Linux systems written in Python 3.
Remote Access Trojan collection.(260+ RAT-Builders!)
Virus - Trojans - Worms - Malwares
KIZAGAN is a RAT,c2 command&control tool.It allows you to build executables and control infected machines.
SpyNote V6.4 Android Trojan
Windows/Linux - ReverseShellBackdoor Framework
A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (POWERSHELL) FROM THE VICTIM MACHINE TO THE ATTACKER CONSOLE , OVER LAN AND WAN.
Very good and stable Android RATs. They are easy to use and they are very stable
Lo4f is a sophistochated RAT (Remote Access Trojan), written entirely in python.
⛔🛡️ WeDefend - Monitor and Protect Windows from Remote Access Trojan
Jarbou3 is rat tool coded in python with C&C which can accept multiple connections from clients
Stealth Kid RAT (SKR) is an open-source multi-platform Remote Access Trojan (RAT) written in C#. Released under MIT license. The SKR project is fully developed and tested on Debian GNU-Linux (Deb 9.8 "Stretch"). The RAT will soon be available on Windows platform by mid-2021.
Python Remote Access Tool
Silent Screenshot Capture | Post Exploitation Payload | VB.NET
FUD Linux Remote Access Trojan
This repostiory contains the python code of command and control trojan which will be controlled from the GitHub repo which contains the configuration file where attacker can specify the task which trojan has to do in the victim machine and then upload the same content / file in the private gihub repository of the attacker.
Add a description, image, and links to the trojan-rat topic page so that developers can more easily learn about it.
To associate your repository with the trojan-rat topic, visit your repo's landing page and select "manage topics."