GitHub - Stealerium/Stealerium: Stealer + Clipper + Keylogger
☆82Aug 18, 2023Updated 2 years ago
Alternatives and similar repositories for Stealerium
Users that are interested in Stealerium are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ContainerTweaks plugin for Rusherhack☆11Jan 30, 2025Updated last year
- C# stealer Chrome, Opera, Chromium ,Edge ,Firefox, IE , Outlook passwords, cookies , bookmarks , autofill , desktop files , wallets☆25Nov 25, 2024Updated last year
- Stealer chrome v81+, Firefox v75+, And more than 30 different programs and crypto-wallets☆11May 1, 2020Updated 5 years ago
- Using process hacker, i noticed that BANDICAM has a "FULLSCREEN" window which has all the properties to be hijacked to render our stuff (…☆13Jan 9, 2026Updated 2 months ago
- A tool to detect open networks, continuously scanning the environment to search for internet access and display reports on nearby Wi-Fi n…☆46Jan 23, 2026Updated 2 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Black Box Fuzzing(Bluetooth)☆10Apr 26, 2016Updated 9 years ago
- discord member botter / booster. creates tokens and instantly joins them into a server 🔥☆12Feb 12, 2023Updated 3 years ago
- Stealer malware written in C++☆15Sep 7, 2024Updated last year
- ☆27May 1, 2023Updated 2 years ago
- Vespy Logger but better fr. Part of vespy 2.0 project. This is a python open source stub builder that recovers personal information from …☆10Apr 24, 2023Updated 2 years ago
- How to Convert Bitcoin-PUBKEY HEX Public Keys to Base58 Bitcoin Address and Check Balance for BTC Coins☆11Aug 26, 2022Updated 3 years ago
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆16Mar 13, 2022Updated 4 years ago
- A GPU orchestraded BIP39 mnemonic solver for BTC blockchain☆12Jul 26, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Работа с логами Echelon, RedLine, Racoon, DCRat etc☆82Jun 29, 2023Updated 2 years ago
- Discord token logging utility☆17Feb 7, 2026Updated last month
- Remote Administration Tool☆13Jul 9, 2023Updated 2 years ago
- Simple, basic obfuscator that was intended for commercial use but is no longer used.☆14Mar 24, 2022Updated 4 years ago
- Just a bunch of useful scripts for netsec/admin/others☆16Dec 9, 2025Updated 3 months ago
- Metamask, Brave, Ronin, Binance Chain, Exodus, Atomic wallets checker☆53Dec 22, 2023Updated 2 years ago
- A cross-platform, memory-safe, and easy-to-use 2FA and credentials manager for PC.☆140Feb 20, 2026Updated last month
- Umbral Stealer is a fast, lightweight stealer written in C#. The collected data is transferred through discord webhooks.☆215Feb 6, 2024Updated 2 years ago
- C# library for the collection of browser information such as cookies, logins, bookmarks and more☆154Feb 18, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A stealthy C++ shellcode loader using anti-analysis checks, AES-256 decryption, and dynamic memory permissions to evade detection. Includ…☆21Apr 2, 2025Updated 11 months ago
- Cryptocurrency wallet decryption program written in C# .NET 7.0☆20Dec 9, 2024Updated last year
- Reproducing the SkeletonKey malware.☆11Apr 6, 2024Updated last year
- Implement Frey-Rück Attack to get the secret key “K” (NONCE) / Critical vulnerability in the Bitcoin☆13Dec 7, 2022Updated 3 years ago
- Sample configuration to include as an Asterisk configuration to supplement automated caller ID spoofing capabilities.☆27Sep 20, 2020Updated 5 years ago
- Various simple code examples utilising large language models's and related tools☆11Jun 12, 2024Updated last year
- .Net Reactor Devirtualizer☆18Aug 24, 2020Updated 5 years ago
- BIP39 mnemonic generator☆11Jun 29, 2021Updated 4 years ago
- 🔒 Modern C2 Platform with Cloudflare Tunnel Integration | WinRM & SSH Remote Management | Real-time Terminal & Remote Desktop | Built wi…☆129Dec 31, 2025Updated 2 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Simple tool to regularly pool Tor HSDirs for hidden service descriptors☆10Jul 3, 2015Updated 10 years ago
- C Program to generate 12 word phrases for Bip39 and use with brainflayer☆14Mar 18, 2019Updated 7 years ago
- Node C++ bindings for Bitcoin Core/Berkeley DB 4.8 wallet.dat☆16Nov 28, 2017Updated 8 years ago
- Fully undetected grabber (grabs wallets, passwords, cookies, modifies discord client etc.)☆164Oct 17, 2022Updated 3 years ago
- router/modem firmware hacking☆33Jul 25, 2018Updated 7 years ago
- The Swiss army knife of evasion tool that bypasses AMSI, Applocker, and CLM mode simultaneously.☆27Mar 9, 2024Updated 2 years ago
- CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution☆51Apr 22, 2024Updated last year