0day2 / SapphireStealerView external linksLinks
A simple stiller with sending logs to your EMAIL, in case of inactivity, write to me in Discord- R3VENGE#1539
☆60Jan 2, 2023Updated 3 years ago
Alternatives and similar repositories for SapphireStealer
Users that are interested in SapphireStealer are comparing it to the libraries listed below
Sorting:
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Jan 20, 2024Updated 2 years ago
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago
- ☆18Jan 31, 2025Updated last year
- BLE based C2 for Hak5's Bash Bunny☆19Oct 31, 2023Updated 2 years ago
- Signatures for wraith used to detect secrets across various sources☆15Jul 8, 2022Updated 3 years ago
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Oct 29, 2024Updated last year
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆263Dec 6, 2025Updated 2 months ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆16Dec 15, 2025Updated 2 months ago
- DefCon Red Team Village 2023 Workshop on DLL Sideloading☆18Aug 15, 2023Updated 2 years ago
- ShellSweeping the evil.☆181Nov 25, 2024Updated last year
- some leaked src code for known and unknown malwares☆23Aug 15, 2025Updated 6 months ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Oct 14, 2020Updated 5 years ago
- Run Sigma detection rules on logs from the new MacOS EndpointSecurity Framework☆22Jan 22, 2021Updated 5 years ago
- Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low…☆147May 6, 2023Updated 2 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆18Nov 17, 2019Updated 6 years ago
- This is the ToRat client, a part of the ToRat Project.☆25Oct 27, 2019Updated 6 years ago
- Application for random attack on Green Petya's key☆25Jul 4, 2017Updated 8 years ago
- Manage attack surface data on Elasticsearch☆24Nov 20, 2023Updated 2 years ago
- Null-free shellcode for TCP reverse shell on Windows x64☆59Feb 19, 2024Updated last year
- Packer is a compact, fast and crosss-platform serialization library for store data in a buffer☆22Aug 5, 2023Updated 2 years ago
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆30Jun 21, 2025Updated 7 months ago
- Purpose-built Red Team network hardware implant made from common components.☆25Mar 18, 2023Updated 2 years ago
- ☆23Sep 20, 2024Updated last year
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆41Feb 8, 2026Updated last week
- A simple POC to expose Mythic as a MCP server☆73Mar 20, 2025Updated 10 months ago
- Malware that we analyzed on our site.☆26Nov 12, 2025Updated 3 months ago
- LD_PRELOAD Linux rootkit (x86 & ARM)☆25Apr 8, 2019Updated 6 years ago
- Ghidra script for extracting embedded Rust crate dependency strings from a compiled Rust binary☆36Aug 9, 2022Updated 3 years ago
- Deleting Shadow Copies In Pure C++☆118Oct 31, 2022Updated 3 years ago
- A post-exploitation toolkit to simulate the weaponization and detection of native Windows binaries based on LOLBas framework.☆31Jun 11, 2023Updated 2 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Apr 15, 2024Updated last year
- Executes shellcode from a remote server and aims to evade in-memory scanners☆32Nov 17, 2019Updated 6 years ago
- Golang command line tool for the macOS Endpoint Security Framework☆29Nov 25, 2019Updated 6 years ago
- Projected developed for fun only that simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persist…☆61May 3, 2024Updated last year
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆60Feb 4, 2025Updated last year
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆34Apr 15, 2021Updated 4 years ago
- Bypass using kernel driver (not finish).☆21Apr 30, 2023Updated 2 years ago
- SecuritySnack data that doesn't fit into a single tweet.☆43Dec 22, 2025Updated last month