0day2 / SapphireStealerLinks
A simple stiller with sending logs to your EMAIL, in case of inactivity, write to me in Discord- R3VENGE#1539
☆59Updated 2 years ago
Alternatives and similar repositories for SapphireStealer
Users that are interested in SapphireStealer are comparing it to the libraries listed below
Sorting:
- Malware vulnerability intel tool for third-party attackers☆122Updated 10 months ago
- A C2 framework built for my bachelors thesis☆55Updated 9 months ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆110Updated 2 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated 2 years ago
- Cross-platform post-exploitation HTTP Command & Control agent written in golang☆102Updated 4 months ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆55Updated 4 months ago
- a small wiper malware programmed in c#☆58Updated 2 years ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆70Updated 4 months ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆132Updated 9 months ago
- ☆84Updated 3 years ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆100Updated 2 years ago
- quick and dirty proof-of-concept to hide shells in images☆50Updated last year
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆39Updated 4 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆106Updated last year
- ☆54Updated 8 months ago
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆13Updated last year
- Rust Weaponization for Red Team Engagements.☆28Updated 2 years ago
- ☆19Updated 4 years ago
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆28Updated 2 years ago
- A Repository to Track Anti-Forensic Techniques☆111Updated 2 years ago
- A proof of concept email spoofing tool built on Docker.☆128Updated 4 years ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆75Updated last week
- C2 Automation using Linode☆84Updated 2 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Updated last year
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆42Updated last year
- PowerShell Script Analyzer☆70Updated last year
- Koadic C3 COM Command & Control - JScript RAT☆45Updated 8 years ago
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆60Updated last year
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 3 years ago
- A DMARC scanning and parsing tool.☆33Updated 4 months ago