EvilBytecode / ThunderKittyLinks
π Open source stealer written in Go, all logs will be sent to Telegram bot.
β118Updated 3 months ago
Alternatives and similar repositories for ThunderKitty
Users that are interested in ThunderKitty are comparing it to the libraries listed below
Sorting:
- β120Updated 9 months ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysisβ78Updated 5 months ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.β49Updated 3 months ago
- Tool to evade Antivirus With Different Techniquesβ185Updated last year
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.β25Updated 3 months ago
- β41Updated 10 months ago
- Next-Gen Stealer written in Go. Stealing from Discord, Chromium-Based & Firefox-Based Browsers, Crypto Wallets and more, from every userβ¦β336Updated 7 months ago
- Ransomware written in go, encrypt - decrypt.β26Updated 3 months ago
- the bear is an infostealer (grabber) malware written in C and assembly with the focus on evading detection.β8Updated 10 months ago
- Exodus and Atomic crypto wallets app.asar injection POC (captures mnemonic and password) for educational purposes only.β22Updated last year
- A simple and efficent script to obfuscate python payloads to make it completely FUDβ36Updated last year
- A Free Open sourced crypter that builds a output .NET .exe Stub (Updated whenever I feel like it)β16Updated 3 months ago
- Spearphishing tools, generate masqueraded pocket executableβ101Updated 2 years ago
- This repository is a tool to create a .suo that when run by visual studio's will achieve code executionβ111Updated last year
- Retrieve the Chrome App Bound key using DLL injection β no administrator privileges required and no need to run from the chrome folder inβ¦β33Updated 3 months ago
- A PowerShell malware that disables all the Windows Security features with UAC Bypass and Anti-VM features. (Designed to work both as a poβ¦β41Updated 2 months ago
- Collection of script templates to create infinite UAC prompts forcing a user to run as admin ββ108Updated last week
- Cronos Crypter is an simple example of crypter created for educational purposes.β102Updated 10 months ago
- Crypter/Stub/Downloader for payloads and malware, bypassing all AV and achiving a score of 0/60 detections on virus totalβ9Updated last year
- β15Updated 3 months ago
- Yandex browser passwords and credit-cards decryption algorithmβ18Updated 3 months ago
- π¦Triton_RAT is free and easy to use, one of the best remote administration tools written in Python, fully integrated with Telegramπ¦β56Updated last month
- Anti-forensics tool Inspired by NSA's Marble framework.β9Updated 3 months ago
- An advanced Ransomware written in C++ and fully customizableβ92Updated last year
- The best powershell obfuscator ever madeβ109Updated this week
- A lightweight remote access trojan in Rustβ30Updated last year
- Simple Powershell Http shell With WEB UIβ72Updated 4 months ago
- Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OSβ55Updated 2 years ago
- RedLine stealer Source Code (Decompiled)β66Updated 5 years ago
- Umbral Stealer is a fast, lightweight stealer written in C#. The collected data is transferred through discord webhooks.β186Updated last year