0day2 / SapphireStealerLinks
A simple stiller with sending logs to your EMAIL, in case of inactivity, write to me in Discord- R3VENGE#1539
☆58Updated 2 years ago
Alternatives and similar repositories for SapphireStealer
Users that are interested in SapphireStealer are comparing it to the libraries listed below
Sorting:
- Malware vulnerability intel tool for third-party attackers☆120Updated 8 months ago
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆27Updated 2 years ago
- Cross-platform post-exploitation HTTP Command & Control agent written in golang☆98Updated 3 months ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated 2 years ago
- A C2 framework built for my bachelors thesis☆55Updated 8 months ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- ☆85Updated 2 years ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆68Updated 3 months ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆55Updated 3 months ago
- Configuration Extractor for BlackCat Ransomware☆30Updated 3 years ago
- Tool for enumerating Active Directory environments☆47Updated last year
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆109Updated 2 years ago
- ☆67Updated 2 years ago
- HeadHunter Command and Control (C2)☆20Updated 5 months ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆72Updated 3 weeks ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆130Updated 8 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- Capture screenshots of onion services on an onion service.☆49Updated last year
- a small wiper malware programmed in c#☆58Updated 2 years ago
- ☆57Updated 2 years ago
- hiding in plain sight: part 2☆45Updated last year
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆34Updated last year
- quick and dirty proof-of-concept to hide shells in images☆50Updated last year
- RegStrike is a .reg payload generator☆58Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆106Updated last year
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆42Updated last year
- ☆109Updated 8 months ago
- A collection of Cobalt Strike Aggressor scripts.☆98Updated 3 years ago
- C2 Automation using Linode☆82Updated 2 years ago