pablocorbalann / trj

Licence: BSL-1.0 License
Execute any command in other's computer using a trojan horse coded and compiled in C. Just for educational purpose.

Programming Languages

python
139335 projects - #7 most used programming language
c
50402 projects - #5 most used programming language
Makefile
30231 projects
shell
77523 projects

Projects that are alternatives of or similar to trj

phishEye
phishEye is an ultimate phishing tool in python. Includes popular websites like Facebook, Twitter, Instagram, LinkedIn, GitHub, Dropbox, and many others. Created with Flask, custom templates, and tunneled with ngrok and localhost.run.
Stars: ✭ 47 (+123.81%)
Mutual labels:  cybersecurity, hacking-tool
Lucifer
A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
Stars: ✭ 302 (+1338.1%)
Mutual labels:  cybersecurity, hacking-tool
phisherprice
All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.
Stars: ✭ 38 (+80.95%)
Mutual labels:  cybersecurity, cracking
Brutus
A Python-powered exploitation framework and botnet.
Stars: ✭ 17 (-19.05%)
Mutual labels:  trojan, hacking-tool
The-MALWARE-Repo
A repository full of malware samples.
Stars: ✭ 380 (+1709.52%)
Mutual labels:  trojan, spyware
Pyiris Backdoor
PyIris-backdoor is a modular, stealthy and flexible remote-access-toolkit written completely in python used to command and control other systems. It is now in the beta stage, possibly perpetually. There are bugs still present in the framework, feel free to contribute or help me out with this project its still under active development >_>
Stars: ✭ 145 (+590.48%)
Mutual labels:  trojan, cybersecurity
PyIris
PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: ✭ 296 (+1309.52%)
Mutual labels:  trojan, cybersecurity
Slowloris
Asynchronous Python implementation of SlowLoris DoS attack
Stars: ✭ 51 (+142.86%)
Mutual labels:  cybersecurity, hacking-tool
Jasmin-Ransomware
Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (+300%)
Mutual labels:  cybersecurity, hacking-tool
trolo
trolo - an easy to use script for generating Payloads that bypasses antivirus
Stars: ✭ 45 (+114.29%)
Mutual labels:  trojan, hacking-tool
Powershell Rat
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Stars: ✭ 636 (+2928.57%)
Mutual labels:  trojan, hacking-tool
SCANNER-INURLBR
Advanced search in search engines, enables analysis provided to exploit GET / POST capturing emails & urls, with an internal custom validation junction for each target / url found.
Stars: ✭ 90 (+328.57%)
Mutual labels:  cybersecurity, hacking-tool
Jwtcat
A CPU-based JSON Web Token (JWT) cracker and - to some extent - scanner.
Stars: ✭ 181 (+761.9%)
Mutual labels:  cybersecurity, cracking
reosploit
A Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Stars: ✭ 89 (+323.81%)
Mutual labels:  cybersecurity, hacking-tool
Wifipassword Stealer
Get All Registered Wifi Passwords from Target Computer.
Stars: ✭ 97 (+361.9%)
Mutual labels:  cybersecurity, hacking-tool
slopShell
the only php webshell you need.
Stars: ✭ 208 (+890.48%)
Mutual labels:  trojan, hacking-tool
Keylogger
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Stars: ✭ 604 (+2776.19%)
Mutual labels:  cybersecurity, hacking-tool
Lockdoor Framework
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (+3123.81%)
Mutual labels:  cybersecurity, hacking-tool
awesome-ddos-tools
Collection of several DDos tools.
Stars: ✭ 75 (+257.14%)
Mutual labels:  cybersecurity, hacking-tool
AttackSurfaceManagement
Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (+114.29%)
Mutual labels:  cybersecurity, hacking-tool

⚠️ Important note: I'm still developing trj. Let's try to get an alpha as soon as posible.

TRJ

GitHub repo size

GitHub forks

Español

Table of contents

Idea

Trc is a Trojan horse created with the intention of having full access to someone else's computer system, accessing their cmd/terminal and being able to execute any command.

To achieve this, a server programmed in Python is used that connects to a socket programmed in C from the client side.

THANKS TO ALL THE PERSONS THAT HAVE STARRED THE REPOSITORY!!!! LOVE YOU GUYS! ❤️

Installing

For using Trj, you will have to install two things, the client and the server. The client has been coded using C, as it can be compiled and the target of the attack will not notice that there is spyware running as a thread. The server is coded in Python.

Prequisites

Name Use Links
Git Clonning the repository Install
Python (v3.6+) Running the server Page
C compiler (gcc) Compiling the client Gnu

The first step for installing trj is clonning the repository to your local machine:

git clone https://github.com/pblcc/trj

Compiling the client

For compiling the client we use a C compiler as gcc and a Makefile. Run the following commands:

cd client/
make all

Now you move inside the directory using

cd build

And run the executable as:

./client.test
NOTE: Using make all you compile the complete client, if you just want to compile the trojan part of the code you can run make client, and if you want to compile the tests of trj use make test
make all # Compiles all the client
make client # Just compiles the actual code of the trj client
make test # Just compiles the tests of trj

Running the server

To run the server you should use Python. Run the following commands:

python server/server.py
NOTE: If you have multiple instalations of Python, use Python3

Legal advice

Trc can be used for malicious purposes so we have to specify a couple of things.

License

This project is under the BSL License

Warranty

Use tcr at your own risk, I am not responsible for any unethical use you make with this repository. This repository has been programmed for educational use.

Todo

  • Create a small server using in Python
  • Create a socket connection using C from the client to the server (tcp)
  • Implement this connection in a simple text chat
  • Upgrade the server so that it can manage more than one client at the same time
  • Create the trojan in C inside client/trojan
  • Make the trojan run in a different thread
  • Include non-trojan code in a second thread, so that the user doesn't notice about the trojan
  • > Export the configuration (yaml, json...)
  • Add flags to the server (port, ip, execute, sudo...)
  • Generate executables

Advanced

Modify the configuration of trj

To configurate the server and the client, check out the configuration.yaml file. There you have all the keys needed to configurate the complete server and the complete client. For example:

  • The port of the server
  • The IP adress
  • The decodification format

And much more.

This configuration is loaded automatically.

If you want to check the configuration (in the server) you can use the -c flag.

cd server
python3 server.py -c

Modify the server IP and port using CLI

You can modify the server IP and the server PORT from the console itself. Instead of running:

python server/server.py

Run:

python server/server.py <ip> <port>

For example:

python server/server 127.0.0.1 4404

Compile just the trojan code

If you want just to compile the trojan code of the project, you can use:

git clone https://github.com/pblcc/trj
cd trj/client/trojan
make

After that you could run just the trojan part of trj using

./trojan-code
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].