0day2 / SapphireStealerLinks
A simple stiller with sending logs to your EMAIL, in case of inactivity, write to me in Discord- R3VENGE#1539
☆59Updated 2 years ago
Alternatives and similar repositories for SapphireStealer
Users that are interested in SapphireStealer are comparing it to the libraries listed below
Sorting:
- Malware vulnerability intel tool for third-party attackers☆122Updated 11 months ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆110Updated 2 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated 2 years ago
- Cross-platform post-exploitation HTTP Command & Control agent written in golang☆102Updated 5 months ago
- ☆84Updated 3 years ago
- a small wiper malware programmed in c#☆58Updated 2 years ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆71Updated 6 months ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆56Updated 2 weeks ago
- A C2 framework built for my bachelors thesis☆57Updated 11 months ago
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Updated last year
- hiding in plain sight: part 2☆45Updated last year
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆132Updated 11 months ago
- quick and dirty proof-of-concept to hide shells in images☆50Updated last year
- Rust Weaponization for Red Team Engagements.☆28Updated 2 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- Configuration Extractor for BlackCat Ransomware☆30Updated 3 years ago
- AntiRansomware Linux Kernel Module☆37Updated 2 years ago
- Some of my Malware Analysis writeups☆48Updated last week
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆121Updated last year
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆59Updated 2 years ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆99Updated 2 years ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆31Updated last year
- ☆54Updated 9 months ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆41Updated 5 months ago
- Koadic C3 COM Command & Control - JScript RAT☆44Updated 8 years ago
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆30Updated 3 years ago
- RegStrike is a .reg payload generator☆58Updated 2 years ago
- Tool for enumerating Active Directory environments☆49Updated 2 years ago
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆20Updated 2 years ago