A simple stiller with sending logs to your EMAIL, in case of inactivity, write to me in Discord- R3VENGE#1539
☆62Jan 2, 2023Updated 3 years ago
Alternatives and similar repositories for SapphireStealer
Users that are interested in SapphireStealer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆18Dec 12, 2023Updated 2 years ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Jan 20, 2024Updated 2 years ago
- BLE based C2 for Hak5's Bash Bunny☆19Oct 31, 2023Updated 2 years ago
- ☆16Jan 5, 2021Updated 5 years ago
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Oct 29, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆16Dec 3, 2020Updated 5 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆15Jan 9, 2019Updated 7 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆16Dec 15, 2025Updated 4 months ago
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆267Dec 6, 2025Updated 4 months ago
- Malicious shortcut file builder for spear-phishing and red-team engagement.☆18Sep 11, 2023Updated 2 years ago
- Null-free shellcode for TCP reverse shell on Windows x64☆61Feb 19, 2024Updated 2 years ago
- Run Sigma detection rules on logs from the new MacOS EndpointSecurity Framework☆22Jan 22, 2021Updated 5 years ago
- Malware that we analyzed on our site.☆26Nov 12, 2025Updated 5 months ago
- Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low…☆147May 6, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Nov 17, 2019Updated 6 years ago
- ShellSweeping the evil.☆181Nov 25, 2024Updated last year
- The tool was created to assist with fuzzing and exploiting stack-based buffer overflows☆10Dec 29, 2020Updated 5 years ago
- Signatures for wraith used to detect secrets across various sources☆15Jul 8, 2022Updated 3 years ago
- Golang command line tool for the macOS Endpoint Security Framework☆29Nov 25, 2019Updated 6 years ago
- Research into COM☆19Jan 25, 2020Updated 6 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- A kernel driver to get a Handle to virtually *every* process☆13Jan 16, 2024Updated 2 years ago
- Dash rootkit. Linux Trojan Backdoor. (MALWARE)☆12Apr 3, 2023Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Encodes a payload within a generated mock-CSS file☆59Sep 18, 2023Updated 2 years ago
- some leaked src code for known and unknown malwares☆23Aug 15, 2025Updated 8 months ago
- ☆19Jan 31, 2025Updated last year
- A simple POC to expose Mythic as a MCP server☆74Mar 20, 2025Updated last year
- Libhide is an iphone icon hiding library to hide icons from springboard using mobile substrate.☆19Oct 13, 2011Updated 14 years ago
- Misc IDA Pro scripts☆23Oct 17, 2016Updated 9 years ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Mar 22, 2024Updated 2 years ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Feb 4, 2022Updated 4 years ago
- WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.☆282Feb 24, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Purpose-built Red Team network hardware implant made from common components.☆28Mar 18, 2023Updated 3 years ago
- Application for random attack on Green Petya's key☆25Jul 4, 2017Updated 8 years ago
- [WIP!] a cross platfrom Go library to work with the notification area / system tray☆11Aug 15, 2019Updated 6 years ago
- A Golang shellcode loader that receives payloads via ICMP packets from a C2 server to bypass firewalls☆24Apr 12, 2023Updated 3 years ago
- Sol-azy is a modular CLI toolchain for static analysis and reverse engineering of Solana sBPF programs☆104Mar 2, 2026Updated 2 months ago
- Ghidra script for extracting embedded Rust crate dependency strings from a compiled Rust binary☆36Aug 9, 2022Updated 3 years ago
- Java RAT called STRRat - Source code & Deobfuscator☆12Aug 12, 2022Updated 3 years ago