Sometimes the download counter breaks and shows 0, I’m not sure how to fix it.
I disclaim all liability for any issues arising from the use of these constructor/builder samples. Always run any constructor or builder in a controlled testing environment, such as a virtual machine. These samples may be used for analysis, detection rule development, IOC extraction, or studying threat actor TTPs. By downloading these samples, you accept all the terms and agree to use them legally and solely for research purposes.
XWorm 5.6 is a Remote Access Trojan (RAT) that allows attackers to control infected systems, often used for espionage and data theft. THIS TOOL HAS NOT BEEN CHECKED FOR VIRUSES; run it in a controlled virtual environment. Use at your own risk and for educational purposes only.
Download 1 Download 2 Chinese VersionLiberium 2.1 is a powerful open-source remote access trojan (RAT) written in C#, featuring capabilities like file management, remote desktop, keylogging, and command execution. It's designed for Windows systems and often used in red teaming and penetration testing scenarios. THIS TOOL HAS NOT BEEN CHECKED FOR VIRUSES; run it in a controlled virtual environment. Use at your own risk and for educational purposes only.
DownloadCraX's RAT 7.6 is a remote access Trojan (RAT) designed specifically for Android devices. It allows attackers to gain unauthorized control over a compromised Android phone, enabling them to steal data, monitor activity, and manipulate the device remotely. THIS TOOL HAS NOT BEEN CHECKED FOR VIRUSES; run it in a controlled virtual environment. Use at your own risk and for educational purposes only. (Unzip the two .zip files and combine their contents into a single folder.).
Part 1 Part 2Silent Crypto Miner Builder is a tool used to create stealthy crypto miners for ETH and XMR that run silently on infected systems. Use at your own risk and for educational purposes only. (SOURCE CODE INCLUDED)
DownloadDarkVision RAT is a malware that gives attackers remote control over infected computers for spying, data theft, and further exploitation. THIS TOOL HAS NOT BEEN CHECKED FOR VIRUSES; run it in a controlled virtual environment. Use at your own risk and for educational purposes only.
DownloadSheet RAT 2.6 is a Remote Access Trojan (RAT) that targets victims through malicious Excel files, granting attackers remote control for spying and data theft. THIS TOOL HAS NOT BEEN CHECKED FOR VIRUSES; run it in a controlled virtual environment. Use at your own risk and for educational purposes only.
DownloadRemcos 3.8.0 is a Remote Access Trojan (RAT) that allows attackers to remotely control and monitor infected systems, enabling data theft, surveillance, and system manipulation. THIS TOOL HAS NOT BEEN CHECKED FOR VIRUSES; run it in a controlled virtual environment. Use at your own risk and for educational purposes only.
DownloadNanoCore 1.2.2.0 is a Remote Access Trojan (RAT) that enables cybercriminals to control infected systems, featuring keylogging, webcam spying, file management, and password theft. THIS TOOL HAS NOT BEEN CHECKED FOR VIRUSES; run it in a controlled virtual environment. Use at your own risk and for educational purposes only.
DownloadnjRAT 0.8d is a widely used Remote Access Trojan (RAT) that gained popularity in the early 2010s. THIS TOOL HAS NOT BEEN CHECKED FOR VIRUSES; run it in a controlled virtual environment. Use at your own risk and for educational purposes only.
Download