Skip to content
#

hidden-statup

Here are 4 public repositories matching this topic...

Trojan builders focus on creating hidden malware with downloader and encryption capabilities. Assembly changers and mutex features ensure uniqueness, while RAT clients provide remote access to infected systems.

  • Updated May 30, 2025
  • Visual Basic .NET

Hidden malware uses techniques like UAC bypass and antivirus bypass to avoid detection. Crypters and shellcode loaders help deploy FUD payloads, while memory exclusion ensures smooth execution without interference.

  • Updated May 30, 2025
  • Visual Basic .NET

RAT tools and malware builders generate trojan clients with hidden startup and encryption. Features like assembly changers and mutex improve stealth, while downloader modules ensure additional payloads are fetched securely.

  • Updated May 30, 2025
  • Visual Basic .NET

Malware builders create hidden trojans with features like UAC bypass and defender bypass. Tools like crypters and FUD ensure antivirus evasion, while shellcode and memory exclusion enhance stealth.

  • Updated May 30, 2025
  • Visual Basic .NET

Improve this page

Add a description, image, and links to the hidden-statup topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the hidden-statup topic, visit your repo's landing page and select "manage topics."

Learn more