Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/byt3n33dl3/offshore
offshore is the most brutal and advance host hunter, ready and steady for rubella ( 7R0J4N ) trojan infections to be spreaded. Bypass several anti-virus software, penetrate a security system. Clear and realtime backdoor alert! results ( straightforward ). Payloads generator, trust attack
https://github.com/byt3n33dl3/offshore
access-control backdoor hosts penetration remote-access shellcode shellscript trojans
Last synced: about 1 month ago
JSON representation
offshore is the most brutal and advance host hunter, ready and steady for rubella ( 7R0J4N ) trojan infections to be spreaded. Bypass several anti-virus software, penetrate a security system. Clear and realtime backdoor alert! results ( straightforward ). Payloads generator, trust attack
- Host: GitHub
- URL: https://github.com/byt3n33dl3/offshore
- Owner: byt3n33dl3
- License: mit
- Created: 2024-03-16T17:01:33.000Z (8 months ago)
- Default Branch: main
- Last Pushed: 2024-07-07T15:54:42.000Z (4 months ago)
- Last Synced: 2024-09-18T06:33:27.745Z (about 2 months ago)
- Topics: access-control, backdoor, hosts, penetration, remote-access, shellcode, shellscript, trojans
- Language: C++
- Homepage: https://trojan-gfw.github.io/trojan/
- Size: 227 KB
- Stars: 16
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
- Security: SECURITY.md
Awesome Lists containing this project
README
## Welcome to offshore
## offshore ( 7R0J4N ) Trojan Infections
A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program. The delivery method typically sees an attacker use social engineering to hide `malicious` code within legitimate software to try and gain users' system access with their software.
- SEattack
- Kernelattack
- ADattackoffshore can detect if they are being run in a sandbox or virtual machine and alter their behavior accordingly. They can check for signs of an analysis environment, such as the presence of debugging tools, and either lay dormant or terminate to avoid detection. Since offshore is build using an advanced **C++** and **C** can use rootkit techniques to gain deep access to the system and hide their activities.
### Credit and Thanks
- Sulaiman - pxcs
- [trojan-gfw.io](https://trojan-gfw.github.io/trojan/)
- [trojan-gfw](https://github.com/trojan-gfw)
- [GangstaCrew]()
- [RubellaTeam]() ( Closed org )