Skip to main content
Home / Hacking Glossary / Trojan Horse

Trojan Horse

Malware disguised as legitimate software that, once executed, performs malicious actions like creating backdoors, stealing data, or downloading additional payloads.

malware
Practice Challenges 2 categories
Active CTF Events 3
View all events →
Related Terms 12

Ready to learn Trojan Horse hands-on?

Put theory into practice with real hacking labs, CTF challenges, and guided courses on Parrot CTFs Events.

Get Started Free