B1ade-Z / NexFuseLinks
Anti-forensics tool Inspired by NSA's Marble framework.
☆9Updated 3 months ago
Alternatives and similar repositories for NexFuse
Users that are interested in NexFuse are comparing it to the libraries listed below
Sorting:
- ☆121Updated 9 months ago
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆116Updated 2 months ago
- Tool to evade Antivirus With Different Techniques☆184Updated last year
- NCrypt portable crypter is a collection of C++ build tools, a tiny C compiler for the stub, and a useful codebase for anyone wanting to c…☆10Updated last year
- the bear is an infostealer (grabber) malware written in C and assembly with the focus on evading detection.☆8Updated 10 months ago
- You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best…☆80Updated 2 months ago
- An advanced Ransomware written in C++ and fully customizable☆92Updated last year
- GENERATE PYTHON BASED FUD STUB☆19Updated last year
- A simple and efficent script to obfuscate python payloads to make it completely FUD☆36Updated last year
- POC | Steal user WhatsApp information/data☆68Updated 2 months ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆70Updated 5 months ago
- Spearphishing tools, generate masqueraded pocket executable☆101Updated 2 years ago
- Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠☆106Updated last week
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆78Updated last year
- Free and open source information stealer written in Go☆33Updated 7 months ago
- Obfuscate and run .exe files in a powershell script☆17Updated 2 years ago
- Stealer in c++.☆42Updated 2 months ago
- Yandex browser passwords and credit-cards decryption algorithm☆18Updated 3 months ago
- Fully Undetected Grabber (Grabs Wallets, Passwords, Cookies, Modifies Discord Client Etc.) Disclaimer: We are not responsible for any dam…☆18Updated this week
- 🦎Triton_RAT is free and easy to use, one of the best remote administration tools written in Python, fully integrated with Telegram🦎☆55Updated 3 weeks ago
- Polymorphic Command & Control☆85Updated 4 months ago
- Over 50 of The Most Deceptive Phishing Templates, Pages & Links for GoPhish!☆36Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆123Updated 2 years ago
- The LockBit builder files☆123Updated last year
- Telegram video (mp4) extension manipulation PoC☆93Updated 4 months ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆135Updated 3 years ago
- .NET Antivirus Evasion Tool (Exe2Bat)☆37Updated 2 years ago
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆36Updated last year
- A lightweight remote access trojan in Rust☆30Updated last year
- Cronos Crypter is an simple example of crypter created for educational purposes.☆102Updated 9 months ago