BloodOnTop / StealeriumView external linksLinks
GitHub - Stealerium/Stealerium: Stealer + Clipper + Keylogger
☆79Aug 18, 2023Updated 2 years ago
Alternatives and similar repositories for Stealerium
Users that are interested in Stealerium are comparing it to the libraries listed below
Sorting:
- A tool to detect open networks, continuously scanning the environment to search for internet access and display reports on nearby Wi-Fi n…☆44Jan 23, 2026Updated 3 weeks ago
- C# stealer Chrome, Opera, Chromium ,Edge ,Firefox, IE , Outlook passwords, cookies , bookmarks , autofill , desktop files , wallets☆25Nov 25, 2024Updated last year
- Sample configuration to include as an Asterisk configuration to supplement automated caller ID spoofing capabilities.☆27Sep 20, 2020Updated 5 years ago
- Source code for LemonLoader's Android and Windows installer☆16Jul 9, 2025Updated 7 months ago
- Universal Hitbox Extender for Roblox.☆13Apr 21, 2025Updated 9 months ago
- ☆13May 24, 2021Updated 4 years ago
- A Browser Password and Discord Token Stealer☆54Jun 12, 2023Updated 2 years ago
- Go ransomware utilising ChaCha20 and ECIES encryption.☆65Jul 3, 2024Updated last year
- Operating System: CPU Scheduling Algorithms☆10Aug 18, 2020Updated 5 years ago
- Photorealism model use RealVisXL v4.0☆12Feb 20, 2024Updated last year
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- Making a lab and testing the CVE-2024-3116, a Remote Code Execution in pgadmin <=8.4☆12Apr 11, 2024Updated last year
- [ICLR 2026] "When AI Agents Collude Online: Financial Fraud Risks by Collaborative LLM Agents on Social Platforms"☆25Feb 3, 2026Updated last week
- Port Invaders is an arcade-style educational game designed to help you learn and memorize common networking port numbers. Whether you're …☆17Sep 4, 2023Updated 2 years ago
- Exploit of the way update plugins works in Webmin, used to gain access to whatever Webmin is being run as (normally root). Written by mem…☆12Nov 15, 2019Updated 6 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Dec 19, 2023Updated 2 years ago
- Работа с логами Echelon, RedLine, Racoon, DCRat etc☆79Jun 29, 2023Updated 2 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Oct 21, 2023Updated 2 years ago
- C# library for the collection of browser information such as cookies, logins, bookmarks and more☆154Feb 18, 2023Updated 2 years ago
- ☆43Jan 28, 2025Updated last year
- Acunetix automate telegram bot☆10Jul 19, 2024Updated last year
- Finance Expenses Tracker SaaS with Paywall☆12Jun 27, 2024Updated last year
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- Analyze suspicious files and URLs to detect types of malware☆11May 14, 2020Updated 5 years ago
- Import and export x64dbg comments/breakpoints/labels/bookmarks in Cutter☆16Apr 2, 2021Updated 4 years ago
- Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum…☆17Jun 12, 2025Updated 8 months ago
- SLAM - Simple Local Area Monitor is a lightweight tool for continuous local network monitoring and device discovery.☆18Jul 9, 2025Updated 7 months ago
- Comprehensive templates and tools for setting up Claude Code workflows☆18Jul 15, 2025Updated 6 months ago
- Just a bunch of useful scripts for netsec/admin/others☆16Dec 9, 2025Updated 2 months ago
- prompt leak for Google Bard☆17Dec 6, 2023Updated 2 years ago
- 35 Days of ReactJS. Understanding the frontend web development with the power of ReactJS along with HTML CSS JavaScript.☆10Aug 1, 2022Updated 3 years ago
- bundler for javascript libraries☆13Feb 22, 2023Updated 2 years ago
- An efficient Python script to obfuscate code by renaming identifiers.☆11Jun 29, 2023Updated 2 years ago
- A brookshear virtual machine written in Go☆10Sep 5, 2019Updated 6 years ago
- A SWZ decryption library for the game Brawlhalla☆10Nov 19, 2022Updated 3 years ago
- Docker setup for Evilginx version 3.0. For educational purposes only!☆13May 16, 2023Updated 2 years ago
- Implementation of SelfExtend from the paper "LLM Maybe LongLM: Self-Extend LLM Context Window Without Tuning" from Pytorch and Zeta☆13Nov 11, 2024Updated last year
- CLI version of NetworkMiner (https://www.netresec.com/?page=NetworkMiner)☆13Dec 1, 2025Updated 2 months ago
- Expeditus is a loader that executes shellcode on a target Windows system. It combines several offensive techniques in order to attempt to…☆13May 30, 2022Updated 3 years ago