Hidden VNC constitutes an ingenious stratagem harnessed by the most adept connoisseurs of technology. This method, by far, presents an exhilarating modality to govern the operation
-
Updated
Nov 9, 2025 - C
Hidden VNC constitutes an ingenious stratagem harnessed by the most adept connoisseurs of technology. This method, by far, presents an exhilarating modality to govern the operation
Linux - Remote Access Terminal (deliberately left out for obvious reasons : CPP remake + obfuscated asm + tunneling + shellcode injection for tcsetattr)
Basic Windows RAT written in C
Remote Administration Tool for windows in Pure c
windows service reverse shell with server
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…
Windows Remote Access Tool
This is the C code for the Remote Access Trojan (RAT) client. It performs various functions such as encryption/decryption, sending/receiving ICMP packets, and anti-debugging measures.
Trojans generally spread by some form of social engineering; for example, where a user is duped into executing an email attachment disguised to appear innocuous (e.g., a routine form to be filled in), or by clicking on some fake advertisement on social media or anywhere else. Although their payload can be anything, many modern forms act as a bac…
This is a simple RAT malware for Windows target.
Simple Linux RAT. Foundation for more sophisticated malware.
C2 extensible for post-explotation and remote control
C2 frameworks for RTO, server and implants for stealth red-teaming mode.
Add a description, image, and links to the rat topic page so that developers can more easily learn about it.
To associate your repository with the rat topic, visit your repo's landing page and select "manage topics."