B1ade-Z / NexFuseLinks
Anti-forensics tool Inspired by NSA's Marble framework.
☆9Updated 2 months ago
Alternatives and similar repositories for NexFuse
Users that are interested in NexFuse are comparing it to the libraries listed below
Sorting:
- Yandex browser passwords and credit-cards decryption algorithm☆15Updated 2 months ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆78Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆122Updated last year
- ☆118Updated 8 months ago
- GENERATE PYTHON BASED FUD STUB☆19Updated last year
- A simple and efficent script to obfuscate python payloads to make it completely FUD☆36Updated last year
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆110Updated 2 years ago
- Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠☆106Updated this week
- Tool to evade Antivirus With Different Techniques☆182Updated last year
- The best powershell obfuscator ever made☆109Updated 2 months ago
- Google Chrome Cookies Stealer. Steals Chrome cookies☆44Updated last year
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆113Updated 2 months ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆62Updated 4 months ago
- the bear is an infostealer (grabber) malware written in C and assembly with the focus on evading detection.☆7Updated 9 months ago
- NCrypt portable crypter is a collection of C++ build tools, a tiny C compiler for the stub, and a useful codebase for anyone wanting to c…☆10Updated last year
- Ransomware written in go, encrypt - decrypt.☆25Updated 2 months ago
- Free and open source information stealer written in Go☆33Updated 6 months ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆134Updated 3 years ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆22Updated 2 years ago
- Stealer in c++.☆42Updated 2 months ago
- My POC implementation of HVNC (Hidden VNC / Hidden Desktop)☆23Updated 5 months ago
- Cronos Crypter is an simple example of crypter created for educational purposes.☆100Updated 9 months ago
- Generate FUD Droppers that are undetectable by popular AV's☆30Updated last year
- A C2 framework built for my bachelors thesis☆55Updated 7 months ago
- You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best…☆76Updated last month
- POC | Steal user WhatsApp information/data☆65Updated last month
- This repository is a tool to create a .suo that when run by visual studio's will achieve code execution☆110Updated last year
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆27Updated 2 years ago
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆35Updated 11 months ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆35Updated 2 months ago