BlueSkySt / Joker
Joker Botnet Source LEAKED
☆12Updated 3 years ago
Alternatives and similar repositories for Joker
Users that are interested in Joker are comparing it to the libraries listed below
Sorting:
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆24Updated 4 years ago
- My (OLD) RE Take On The Faux Green Petya Ransomware Builder & Client.☆20Updated 3 years ago
- A windows kernel-mode rootkit with remote control☆12Updated 2 years ago
- The Cayosin Bot features unique RHex STD and RHex HTTP attacks. Meaning that the Hex Strings are randomly selected. Cayosin also contains…☆13Updated 4 years ago
- Get/dump chrome and firefox saved passwords.☆20Updated 4 years ago
- ☆9Updated 4 years ago
- malware development kit for x86 windows based platforms with a linux compatible build system☆10Updated 2 years ago
- A very weird RAT☆19Updated 2 years ago
- A repository containing C concepts I made when I was bored. You can also use this repository to learn C yourself.☆8Updated 3 years ago
- TaskMgr Volatile Environment LPE☆13Updated 5 months ago
- Remote Access Tool Written In C#☆12Updated 3 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Updated 4 years ago
- This script make any windows compatible with RDP connection☆19Updated 3 months ago
- Download payload to disk and install it to startup then melt.☆36Updated 6 years ago
- Fully undetectable UAC Bypass exploit - https://youtu.be/KfOPW0XI99s☆17Updated 3 years ago
- DarkRats Standalone HVNC☆24Updated 2 years ago
- ☆16Updated 3 years ago
- Basic disassembly technique to slow down disasm process☆10Updated 5 years ago
- ☣️ Necro Stealer + Web Panel☆10Updated 5 years ago
- Multipurpose malware framework☆24Updated 3 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Updated 5 years ago
- Process injection via KernelCallbackTable☆14Updated 3 years ago
- ADR is a trojan that retrieves all information on the computer and all data stored in applications using chormuim. It recovers cookies, t…☆25Updated last year
- ☆8Updated 5 years ago
- My Own VirtualAlloc Implementation to use as alternative unknown for all the defense solutions of VirtualAlloc Win32 API Function☆8Updated last year
- Decompiled NotPetya File Encryptor Code☆14Updated 2 years ago
- Deobfuscator for : https://github.com/Blank-c/BlankOBF☆14Updated last year
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆27Updated 5 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13Updated 3 years ago
- using the Recycle Bin to insure persistence☆12Updated 2 years ago