Telegram Desktop Session Stealer
☆179May 20, 2019Updated 6 years ago
Alternatives and similar repositories for TeleShadow3
Users that are interested in TeleShadow3 are comparing it to the libraries listed below
Sorting:
- TeleShadow - Telegram Desktop Session Stealer (Windows)☆116Jun 28, 2018Updated 7 years ago
- A Tools Session Hijacking And Stealer Local Passcode Telegram Windows☆444Jun 28, 2023Updated 2 years ago
- A simple python reverse shell written just for fun.☆62Feb 6, 2023Updated 3 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- Basic Multiplatform Remote Administration Tool - Xamarin☆384Apr 19, 2020Updated 5 years ago
- ☆12Dec 26, 2022Updated 3 years ago
- Ubuntu stealer, steal ubuntu information in local pc☆21Jan 16, 2020Updated 6 years ago
- A Tool For Crypt File And Bypass AntiVirus Even msfvenom Payloads☆19Sep 6, 2019Updated 6 years ago
- NSA's IIS 6.0 exploit that creates a remote backdoor.☆19Feb 12, 2019Updated 7 years ago
- RAT-via-Telegram☆39Apr 20, 2017Updated 8 years ago
- (THIS CODE IS OUTDATED FOR NEW CHROME VERSIONS) Decrypt chromium based browsers passwords, cookies, credit cards, history, bookmarks, au…☆814Jan 12, 2025Updated last year
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Dec 19, 2018Updated 7 years ago
- Simple Free Crypter for .NET Trojans like njRAT☆199Mar 10, 2020Updated 5 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 7 years ago
- 🔅 Reverse shell written on python3☆14Dec 12, 2020Updated 5 years ago
- Crypter For Malware and Stealer☆33Apr 10, 2020Updated 5 years ago
- Python script for trying default passwords for some TP-Link Hotspots☆35Apr 29, 2021Updated 4 years ago
- Crappy cookie stealer☆109Nov 15, 2020Updated 5 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- Program for remote computer management with Telegram on native C++ - by B4DB4B3☆115May 30, 2021Updated 4 years ago
- PAnalizer is a forensic tool, you can search pornographic images in a specific directory, this is util in Pedestrian Detection. Also you …☆45May 6, 2019Updated 6 years ago
- MappingInjection via csharp☆40Nov 19, 2021Updated 4 years ago
- Network Assessment Assistance Framework (PenTest Toolkit).☆42Nov 18, 2019Updated 6 years ago
- Salsa Tools - ShellReverse TCP/UDP/ICMP/DNS/SSL/BINDTCP/Shellcode/SILENTTRINITY and AV bypass, AMSI patched☆584Jan 31, 2020Updated 6 years ago
- Telegram Remote Access Tool for Windows☆63Aug 11, 2025Updated 6 months ago
- Embedding a "UAC-Bypassing" function into your custom payload☆98Aug 13, 2022Updated 3 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19May 1, 2020Updated 5 years ago
- Mining on restricted environments made easy! Hidden GUI Ethereum miner that mines to NiceHash wallet or Normal Ethereum wallet.…☆13Oct 24, 2020Updated 5 years ago
- A Simple RedLineStealer☆13Aug 30, 2023Updated 2 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago
- AutoIt HackTool, Shortcuts .lnk Payloads Generator As LNK-KISSER.☆104Feb 6, 2018Updated 8 years ago
- Browser and apps data stealer☆24Jan 1, 2024Updated 2 years ago
- LimeRAT | Simple, yet powerful remote administration tool for Windows (RAT)☆1,126Jun 24, 2019Updated 6 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- Six Degrees of Domain Admin☆15Oct 23, 2017Updated 8 years ago
- 🤖 ☠️ 💬 A simple Telegram Bot that controls the victim's computer.☆45Sep 20, 2025Updated 5 months ago
- Joomla Vulnerability Component Scanner☆62Sep 28, 2018Updated 7 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆177Aug 8, 2024Updated last year
- I created the python script to bypass UAC to get system shell .☆121Sep 2, 2019Updated 6 years ago