EvilBytecode / ThunderKittyLinks
π Open source stealer written in Go, all logs will be sent to Telegram bot.
β116Updated 2 months ago
Alternatives and similar repositories for ThunderKitty
Users that are interested in ThunderKitty are comparing it to the libraries listed below
Sorting:
- β120Updated 8 months ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysisβ69Updated 4 months ago
- Tool to evade Antivirus With Different Techniquesβ184Updated last year
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.β47Updated 2 months ago
- A simple and efficent script to obfuscate python payloads to make it completely FUDβ36Updated last year
- Next-Gen Stealer written in Go. Stealing from Discord, Chromium-Based & Firefox-Based Browsers, Crypto Wallets and more, from every userβ¦β332Updated 7 months ago
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.β25Updated 2 months ago
- Ransomware written in go, encrypt - decrypt.β25Updated 2 months ago
- Free and open source information stealer written in Goβ33Updated 7 months ago
- Spearphishing tools, generate masqueraded pocket executableβ101Updated 2 years ago
- Exodus and Atomic crypto wallets app.asar injection POC (captures mnemonic and password) for educational purposes only.β23Updated last year
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotalβ78Updated last year
- Stealer in c++.β42Updated 2 months ago
- Yandex browser passwords and credit-cards decryption algorithmβ17Updated 3 months ago
- Retrieve the Chrome App Bound key using DLL injection β no administrator privileges required and no need to run from the chrome folder inβ¦β31Updated 2 months ago
- An advanced Ransomware written in C++ and fully customizableβ92Updated last year
- A lightweight remote access trojan in Rustβ30Updated last year
- GENERATE PYTHON BASED FUD STUBβ19Updated last year
- You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the bestβ¦β80Updated 2 months ago
- Collection of script templates to create infinite UAC prompts forcing a user to run as admin ββ106Updated last week
- A Free Open sourced crypter that builds a output .NET .exe Stub (Updated whenever I feel like it)β16Updated 2 months ago
- A PowerShell malware that disables all the Windows Security features with UAC Bypass and Anti-VM features. (Designed to work both as a poβ¦β39Updated last month
- This repository is a tool to create a .suo that when run by visual studio's will achieve code executionβ111Updated last year
- the bear is an infostealer (grabber) malware written in C and assembly with the focus on evading detection.β8Updated 10 months ago
- Here are +200 different rats some with source codeβ103Updated last year
- The best powershell obfuscator ever madeβ108Updated 2 months ago
- VenomRAT-HVNC 5.6, this is the latest version with a working HVNC module !β155Updated 2 years ago
- Anti-forensics tool Inspired by NSA's Marble framework.β9Updated 2 months ago
- RedLine stealer Source Code (Decompiled)β66Updated 5 years ago
- Umbral Stealer is a fast, lightweight stealer written in C#. The collected data is transferred through discord webhooks.β184Updated last year