TrojanCockroach | A Stealthy Trojan Spyware
kandi X-RAY | TrojanCockroach Summary
kandi X-RAY | TrojanCockroach Summary
TrojanCockroach is a C++ library. TrojanCockroach has no bugs, it has no vulnerabilities, it has a Permissive License and it has low support. You can download it from GitHub.
A Stealthy Trojan Spyware
A Stealthy Trojan Spyware
Support
Quality
Security
License
Reuse
Support
TrojanCockroach has a low active ecosystem.
It has 682 star(s) with 233 fork(s). There are 64 watchers for this library.
It had no major release in the last 6 months.
There are 19 open issues and 10 have been closed. On average issues are closed in 46 days. There are no pull requests.
It has a neutral sentiment in the developer community.
The latest version of TrojanCockroach is current.
Quality
TrojanCockroach has 0 bugs and 0 code smells.
Security
TrojanCockroach has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.
TrojanCockroach code analysis shows 0 unresolved vulnerabilities.
There are 0 security hotspots that need review.
License
TrojanCockroach is licensed under the MIT License. This license is Permissive.
Permissive licenses have the least restrictions, and you can use them in most projects.
Reuse
TrojanCockroach releases are not available. You will need to build from source code and install.
Installation instructions are available. Examples and code snippets are not available.
Top functions reviewed by kandi - BETA
kandi's functional review helps you automatically verify the functionalities of the libraries and avoid rework.
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of TrojanCockroach
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of TrojanCockroach
TrojanCockroach Key Features
No Key Features are available at this moment for TrojanCockroach.
TrojanCockroach Examples and Code Snippets
No Code Snippets are available at this moment for TrojanCockroach.
Community Discussions
No Community Discussions are available at this moment for TrojanCockroach.Refer to stack overflow page for discussions.
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install TrojanCockroach
Preparation Download the full package from here. Change the method sendData() of TrojanCockroach.cpp- place your email and password in the command. Compile TrojanCockroach.cpp & Infect.cpp. Transmit.exe is actually the executable distribution of curl for Windows. Place TrojanCockroach.exe, Infect.exe, Transmit.exe, Infect.lnk & TrojanCockroach.lnk in the same folder. This is how they look- Now run TrojanCockroach.exe then insert a pendrive (see the magic!). You will get a hidden folder and link file in your pendrive. The hidden folder contains the full package, & the link file is actually renamed form of Infect.lnk.
Attack Insert the USB-Drive in the subject's PC (Yes, you have to start the spreading process from somewhere!). Run Infect.lnk and the spyware will be injected. The syware will be activated after a reboot. Now (after a restart) every time any USB-Drive is inserted in the affected PC, the virus will copy itself in that, and the cycle will start again.
Data Collection You need to wait several days (depending on the number of power on/off of the PC), before getting any data. After getting the email copy the full message to a text file. As the message has come through email certain characters are converted. To resolve that --- --- ---. Now, run DecodeMessage.exe for decoding the message as plain text. In this phase, you can look for specific patterns in the text, and thus get rid of most of the useless parts (like- mouse click, or same key-group press as happens during gaming).
Attack Insert the USB-Drive in the subject's PC (Yes, you have to start the spreading process from somewhere!). Run Infect.lnk and the spyware will be injected. The syware will be activated after a reboot. Now (after a restart) every time any USB-Drive is inserted in the affected PC, the virus will copy itself in that, and the cycle will start again.
Data Collection You need to wait several days (depending on the number of power on/off of the PC), before getting any data. After getting the email copy the full message to a text file. As the message has come through email certain characters are converted. To resolve that --- --- ---. Now, run DecodeMessage.exe for decoding the message as plain text. In this phase, you can look for specific patterns in the text, and thus get rid of most of the useless parts (like- mouse click, or same key-group press as happens during gaming).
Support
For any new features, suggestions and bugs create an issue on GitHub.
If you have any questions check and ask questions on community page Stack Overflow .
Find more information at:
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page