Remote Access Trojans
These sophisticated malware variants are designed to infiltrate systems, granting cybercriminals remote control and access. They often operate covertly, evading detection while enabling a range of malicious activities such as data theft, surveillance, or even system manipulation.
RATs are notorious for exploiting vulnerabilities in security protocols, allowing attackers to execute commands remotely, bypassing traditional defense mechanisms.
Samples
888RAT
A remote access trojan (RAT) known for its versatility and ability to control infected computers remotely.
Adwind
A cross-platform RAT capable of infecting multiple operating systems, including Windows, macOS, and Linux.
ArdaMax
A RAT with various spying capabilities, including key-logging, screen capture, and remote desktop control.
CyberGate
A remote administration tool (RAT) used by cybercriminals to gain unauthorized access to infected systems and execute malicious actions remotely.
DarkComet
A remote access trojan (RAT) notorious for its surveillance features, including key-logging, webcam monitoring, and file system access, often used in cyber espionage operations.
DarkCloud
A malware variant known for its stealthy behavior and data exfiltration capabilities, often used in targeted espionage campaigns.
Gh0stRAT
A remote access trojan (RAT) used by cybercriminals to gain unauthorized access to infected systems, allowing them to steal data, monitor activities, and execute commands remotely.
Glupteba
A sophisticated malware strain known for its stealthy behavior and multiple functionalities, including cryptocurrency mining, information stealing, and proxy tunneling.
MetamorpherRAT
A remote access trojan (RAT) known for its ability to evade detection by changing its characteristics, making it challenging for security software to detect and remove.
Nanocore
A remote access trojan (RAT) known for its robust feature set, including keylogging, remote desktop control, and file system manipulation, often used in cyber espionage and data theft campaigns.
NETWire
A remote access trojan (RAT) known for its extensive feature set, including key-logging, webcam capture, and file system manipulation, often used in cyber espionage and data theft operations.
Quasar
A remote access trojan (RAT) known for its extensive feature set, including key-logging, remote desktop control, and file system manipulation, often used in targeted cyberattacks.
Remcos
A remote access trojan (RAT) known for its extensive feature set, including remote desktop control, file management, and surveillance capabilities, often used in targeted cyberattacks.
RevangeRAT
A remote access trojan (RAT) known for its surveillance capabilities, including key-logging, screen capture, and webcam monitoring, often used in cyber espionage operations.
SectopRAT
A remote access trojan (RAT) known for its surveillance capabilities, including keylogging, screen capture, and remote desktop control, often used in cyber espionage operations.
WarzoneRAT
A remote access trojan (RAT) known for its surveillance capabilities, including keylogging, screen capture, and remote desktop control, often used in cyber espionage operations.
WSHRAT
A remote access trojan (RAT) named after its use of Windows Script Host (WSH) for execution, allowing attackers to gain unauthorized access to infected systems.
XenorRat
A remote access trojan (RAT) designed for Windows systems, allowing attackers to remotely control infected devices, steal data, and execute malicious commands.
ZGRat
A remote access trojan (RAT) known for its surveillance capabilities, including key-logging, screen capture, and remote desktop control, often used in cyber espionage operations.
Happy99
Happy99, also known as Ska, is a type of malware that spreads via email attachments and infects Windows systems.
NJRAT
NJRAT (also known as Nanocore or Nano Core RAT) is a remote access trojan designed to provide unauthorized access and control over infected systems.
Warning
The information provided on this website is intended for educational purposes only. It should not be used to create, distribute, or execute any malicious software. We strongly condemn the use of malware for illegal or unethical activities.
Malware samples can cause harm to your computer system and compromise your security. Handle these samples with extreme care and only in isolated environments. Do not execute these samples on any system connected to the internet or any network containing sensitive information.
The maintainer and contributors of this repository, both past, present, and future, are not responsible for any loss of data, system damage, or other consequences resulting from the mishandling of the samples provided herein. Caution is advised when testing any file present in this repository.