Skip to content

Commit

Permalink
Update README.md
Browse files Browse the repository at this point in the history
  • Loading branch information
ThatSINEWAVE committed May 20, 2024
1 parent 055a523 commit 7179153
Showing 1 changed file with 2 additions and 0 deletions.
2 changes: 2 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -62,6 +62,7 @@ We aim to continuously enhance the usability and value of this repository. Here
18. **XenorRat** - A remote access trojan (RAT) designed for Windows systems, allowing attackers to remotely control infected devices, steal data, and execute malicious commands.
19. **ZGRat** - A remote access trojan (RAT) known for its surveillance capabilities, including key-logging, screen capture, and remote desktop control, often used in cyber espionage operations.
20. **Happy99** - Also known as Ska, is a type of malware that spreads via email attachments and infects Windows systems.
21. **NJRAT** - NJRAT (also known as Nanocore or Nano Core RAT) is a remote access trojan designed to provide unauthorized access and control over infected systems.

### Ransomware
1. **Cerber** - A notorious ransomware known for encrypting files on infected computers and demanding payment in cryptocurrency for decryption.
Expand Down Expand Up @@ -113,6 +114,7 @@ We aim to continuously enhance the usability and value of this repository. Here
21. **Bonzify** - A malicious trojan horse program designed to infiltrate computer systems stealthily and perform various harmful actions.
22. **000** - A notorious malware known for its malicious activities across various computer systems.
23. **Madal** - A trojan that infiltrates systems through deceptive means, such as email attachments, software downloads, or compromised websites.
24. **FakeAV** - FakeAV, also known as Rogue Antivirus, is a type of malware that deceives users into believing their systems are infected with malicious software.

<div align="center">

Expand Down

0 comments on commit 7179153

Please sign in to comment.