BlueSkySt / Joker
Joker Botnet Source LEAKED
☆12Updated 3 years ago
Alternatives and similar repositories for Joker:
Users that are interested in Joker are comparing it to the libraries listed below
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆24Updated 4 years ago
- Remote Access Tool Written In C#☆12Updated 3 years ago
- My (OLD) RE Take On The Faux Green Petya Ransomware Builder & Client.☆21Updated 3 years ago
- The Cayosin Bot features unique RHex STD and RHex HTTP attacks. Meaning that the Hex Strings are randomly selected. Cayosin also contains…☆13Updated 4 years ago
- A very weird RAT☆19Updated 2 years ago
- ☆16Updated 3 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Updated 4 years ago
- DarkRats Standalone HVNC☆24Updated 2 years ago
- Fastest malware, which send victim photo from camera on your HTTP-panel☆8Updated 3 years ago
- Multipurpose malware framework☆23Updated 3 years ago
- ☆9Updated 4 years ago
- malware development kit for x86 windows based platforms with a linux compatible build system☆10Updated 2 years ago
- ⚡ Create infinate UAC prompts forcing a user to run as admin ⚡☆12Updated 2 years ago
- 🚀 Builder of Malware Loader☆15Updated 4 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Updated 5 years ago
- Get/dump chrome and firefox saved passwords.☆19Updated 4 years ago
- An advanced malware framework.☆10Updated 3 years ago
- Simple keylogger written in C# which is ready for modifications.☆13Updated 3 years ago
- Basic disassembly technique to slow down disasm process☆10Updated 5 years ago
- ☣️ Necro Stealer + Web Panel☆10Updated 4 years ago
- This repository will present all Information interest about Thanatos Ransomware after analysis☆8Updated 6 years ago
- Using bitsadmin to download our malware and to bypass defender☆27Updated 3 years ago
- Decompiled NotPetya File Encryptor Code☆13Updated 2 years ago
- Download payload to disk and install it to startup then melt.☆35Updated 5 years ago
- ADR is a trojan that retrieves all information on the computer and all data stored in applications using chormuim. It recovers cookies, t…☆25Updated last year
- A Scantime Crytper that applies an obfuscation method onto a malware/false-positive so an antivirus cannot successfully match it with any…☆16Updated 3 years ago
- Persistent & Undetectable Malware Backdoor☆29Updated 10 months ago
- A windows kernel-mode rootkit with remote control☆12Updated 2 years ago
- This script make any windows compatible with RDP connection☆18Updated 2 months ago
- TaskMgr Volatile Environment LPE☆13Updated 4 months ago