All Projects → MinhasKamal → Trojancockroach

MinhasKamal / Trojancockroach

Licence: mit
A Stealthy Trojan Spyware

Programming Languages

cpp
1120 projects

Projects that are alternatives of or similar to Trojancockroach

ToxicEye
👽 Program for remote control of windows computers via telegram bot. Written in C#
Stars: ✭ 305 (-28.07%)
Mutual labels:  virus, malware, trojan, keylogger
Gobot2
Second Version of The GoBot Botnet, But more advanced.
Stars: ✭ 431 (+1.65%)
Mutual labels:  malware, keylogger, virus
Malware-with-Backdoor-and-Keylogger
👨🏻‍💻 A great tool for Ethical Hackers, a malware programmed with Backdoor and Keylogger.
Stars: ✭ 25 (-94.1%)
Mutual labels:  virus, malware, keylogger
KeyPlexer
Capstone: Keylogger Trojan
Stars: ✭ 32 (-92.45%)
Mutual labels:  malware, trojan, keylogger
Inferno
🔥 Modern command line tool for malware creation on Windows
Stars: ✭ 105 (-75.24%)
Mutual labels:  malware, keylogger, virus
Serpentine
C++/Win32/Boost Windows RAT (Remote Administration Tool) with a multiplatform Java/Spring RESTful C2 server and Go, C++/Qt5 frontends
Stars: ✭ 216 (-49.06%)
Mutual labels:  malware, trojan, virus
Malware
Rootkits | Backdoors | Sniffers | Virus | Ransomware | Steganography | Cryptography | Shellcodes | Webshells | Keylogger | Botnets | Worms | Other Network Tools
Stars: ✭ 156 (-63.21%)
Mutual labels:  malware, keylogger, virus
The-MALWARE-Repo
A repository full of malware samples.
Stars: ✭ 380 (-10.38%)
Mutual labels:  virus, malware, trojan
Adamantium Thief
🔑 Decrypt chromium based browsers passwords, cookies, credit cards, history, bookmarks, autofill. Version > 80 is supported.
Stars: ✭ 283 (-33.25%)
Mutual labels:  malware, trojan, virus
Richkware
Framework for building Windows malware, written in C++
Stars: ✭ 315 (-25.71%)
Mutual labels:  malware, keylogger, virus
ConTroll Remote Access Trojan
Created a VERY SIMPLE remote access Trojan that will establish administrative control over any windows machine it compromises.
Stars: ✭ 69 (-83.73%)
Mutual labels:  virus, malware, trojan
Stupidkeylogger
A Terrific Keystroke Recorder
Stars: ✭ 318 (-25%)
Mutual labels:  trojan, keylogger, virus
Ragnarok
Virus Package ( For Educational Purposes )
Stars: ✭ 23 (-94.58%)
Mutual labels:  virus, malware
Cerberus
A complete Grabber, sending data to a TCP server that you have to host and stocking all in a database.
Stars: ✭ 32 (-92.45%)
Mutual labels:  virus, malware
Virii
Collection of ancient computer virus source codes
Stars: ✭ 378 (-10.85%)
Mutual labels:  malware, virus
claw
Source code of Claw Key logger previously sold on HackForums
Stars: ✭ 33 (-92.22%)
Mutual labels:  malware, keylogger
RoboThief-Telegram-Session-Stealer
Robo Thief is a software for steal telegram session .
Stars: ✭ 18 (-95.75%)
Mutual labels:  malware, trojan
MalwareDatabase
Malware samples for analysis, researchers, anti-virus and system protection testing.(1300+ Malware-samples!)
Stars: ✭ 21 (-95.05%)
Mutual labels:  virus, malware
Fe2O3
Simple prepender virus written in Rust
Stars: ✭ 84 (-80.19%)
Mutual labels:  virus, malware
carrierwave-attachmentscanner
Adds the ability to send CarrierWave uploads to Attachment Scanner for virus and malware prevention.
Stars: ✭ 14 (-96.7%)
Mutual labels:  virus, malware

Trojan Cockroach

A Stealthy Trojan Spyware

You are looking at a Trojan Virus that steals data (ID, password; every key stroke) from PC (Windows XP or later), then emails them back to you. It spreads among PCs through USB drives, and is almost undetectable to any antivirus software.

Created only for learning purpose.

Intro

  • TrojanCockroach.cpp- logs user's data, sends data through Transmit.exe, infects portable drive.
  • Infect.cpp- installs the virus into computer from portable drive.
  • Transmit.exe- emails data back.
  • TrojanCockroach.lnk- resides in the startup folder of PC and activates TrojanCockroach.exe.
  • Infect.lnk- takes different attractive names in the infected portable drive, activates Infect.exe when clicked.
  • DecodeMessage.cpp- used to decode received email.

Setup

  1. Preparation
    1. Download the full package from here.

    2. Change the method sendData() of TrojanCockroach.cpp- place your email and password in the command.
      change email address

    3. Compile TrojanCockroach.cpp & Infect.cpp. Transmit.exe is actually the executable distribution of curl for Windows.

    4. Place TrojanCockroach.exe, Infect.exe, Transmit.exe, Infect.lnk & TrojanCockroach.lnk in the same folder. This is how they look-
      Trojan Cockroach full package

    5. Now run TrojanCockroach.exe then insert a pendrive (see the magic!). You will get a hidden folder and link file in your pendrive. The hidden folder contains the full package, & the link file is actually renamed form of Infect.lnk.
      Trojan Cockroach infected pendrive

  2. Attack
    1. Insert the USB-Drive in the subject's PC (Yes, you have to start the spreading process from somewhere!). Run Infect.lnk and the spyware will be injected.

    2. The syware will be activated after a reboot. Now (after a restart) every time any USB-Drive is inserted in the affected PC, the virus will copy itself in that, and the cycle will start again.

  3. Data Collection
    1. You need to wait several days (depending on the number of power on/off of the PC), before getting any data.

    2. After getting the email copy the full message to a text file.
      Trojan Cockroach infected pendrive
      As the message has come through email certain characters are converted. To resolve that --- --- ---.

    3. Now, run DecodeMessage.exe for decoding the message as plain text.
      Trojan Cockroach infected pendrive
      In this phase, you can look for specific patterns in the text, and thus get rid of most of the useless parts (like- mouse click, or same key-group press as happens during gaming).

Further

You may read TrojanCockroachStory to get an overview of how the program works. You will get a clearer understanding of the project from its pre-project- StupidKeyLogger.

The project is perfectly runnable. However, I do not want newbies to abuse my project. So, I am keeping some simple secrets unrevealed. There are also some intentionally created holes in this 'README'. I have made some nonsense changes in the code too; so that- no one can run it effectively without getting his hands dirty. I believe these plain obstacles can easily be overcome by ACTUAL PROGRAMMERS :)

Note: I will not also take any responsibility of someone else's ill act with this program. But I do believe that a real learner will learn a lot from this.

License

MIT License
Trojan Cockroach is licensed under MIT License.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].