Cross-Platform Android Remote Administration Tool | Official maintained repository for the AhMyth R.A.T Project | A dedicated revival of the original repository at https://.com/AhMyth/AhMyth-Android-RAT
- Updated
Jun 17, 2025 - Smali
Cross-Platform Android Remote Administration Tool | Official maintained repository for the AhMyth R.A.T Project | A dedicated revival of the original repository at https://.com/AhMyth/AhMyth-Android-RAT
SARA - Simple Android Ransomware Attack
Remote Access Trojan collection.(260+ RAT-Builders!)
SpyNote V6.4 Android Trojan
This is my private RAT collection, i want to share.
TheBhTiNjector is a filebinder that can concatenate two or more files of some extensions that preserves the integrity of the files and gives you the option of injecting shellcode into them.
Remote Administration Tool
Remote Administration Tool
Remote Administration Tool
Remote Administration Tool
Prueba de concepto de un troyano simple desarrollado en Visual Basic 6.0
Remote Administration Tool
Discord based C2
Config files for my profile.https://.com/bournius93
Crypter encrypts malware to evade detection, often paired with FUD or UAC bypass techniques. Batch files serve as malware downloaders or trojans, created using builders. Tools like batch crypter or fud crypter ensure stealth.
RAT tools and malware builders generate trojan clients with hidden startup and encryption. Features like assembly changers and mutex improve stealth, while downloader modules ensure additional payloads are fetched securely.
Hidden malware uses techniques like UAC bypass and antivirus bypass to avoid detection. Crypters and shellcode loaders help deploy FUD payloads, while memory exclusion ensures smooth execution without interference.
Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.
Trojan builders focus on creating hidden malware with downloader and encryption capabilities. Assembly changers and mutex features ensure uniqueness, while RAT clients provide remote access to infected systems.
Malware builders create hidden trojans with features like UAC bypass and defender bypass. Tools like crypters and FUD ensure antivirus evasion, while shellcode and memory exclusion enhance stealth.
Add a description, image, and links to the trojan-builder topic page so that developers can more easily learn about it.
To associate your repository with the trojan-builder topic, visit your repo's landing page and select "manage topics."