This is a File Stealer written in Python. As of the 07/05/23, this is undetectable in virus total. This is designed as powerful file stealer to steal all the files from a victims computer and then forwards the files to a discord webhook
☆28May 8, 2023Updated 2 years ago
Alternatives and similar repositories for Python-File-Stealer
Users that are interested in Python-File-Stealer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A python trojan with spyware, info stealing and ransomware abilities.☆34Sep 12, 2025Updated 7 months ago
- A Powerful Token Stealer! Discord Token Grabber , Password Stealer, Cookie Stealer, File Stealer, Crypto wallet Stealer☆17Apr 13, 2023Updated 3 years ago
- Steal Files in Termux☆31Dec 11, 2020Updated 5 years ago
- A botnet based on a discord command and control centre written in python.☆19Sep 10, 2023Updated 2 years ago
- Good python obfuscator☆11Aug 20, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Decompiler and deobfuscator that offers support to track discord webhooks inside: blank stealer, luna grabber, thiefcat, Creal and all un…☆113Nov 11, 2024Updated last year
- Source code of TrojanXD☆14Feb 11, 2022Updated 4 years ago
- discord member botter / booster. creates tokens and instantly joins them into a server 🔥☆13Feb 12, 2023Updated 3 years ago
- A Hacking and Pentesting Tool for Windows☆20Jul 17, 2025Updated 8 months ago
- AXIS Botnet☆17May 16, 2024Updated last year
- Some stuff for PHD2021☆14May 21, 2025Updated 10 months ago
- 🔥 [ NEW ] 🔥 A Powerfull Token Stealer! Discord Token Grabber , Password Stealer, Cookie Stealer, File Stealer, Crypto wallet Stealer et…☆21Jun 27, 2024Updated last year
- It's a bash (unix shell) encrypted, mutant and polymorphic virus.☆10Aug 23, 2022Updated 3 years ago
- There are many powerful viruses 💀 that can damage your PC in a matter of seconds. Batch file virus to gain full access to another comput…☆51Mar 7, 2021Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- Code and notes regarding Malware Development☆11Oct 30, 2022Updated 3 years ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆24Aug 5, 2025Updated 8 months ago
- A Simple Python Extractor, Decompiler, Deobfuscator, and Disassembler that helps you Reverse Engineer Python-Based Malware, Viruses, Rans…☆59Jun 4, 2022Updated 3 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Oct 21, 2023Updated 2 years ago
- Beacon Object File (BOF) for identifying dependent child services of a given parent.☆19Jun 20, 2025Updated 9 months ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- A tool to create randomly insecure file shares that also contain unsecured credential files☆49Feb 16, 2026Updated 2 months ago
- string encryption in Nim☆19Jun 15, 2024Updated last year
- ☆20Nov 6, 2023Updated 2 years ago
- ☆14Jul 18, 2019Updated 6 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- Admin Panel Bruteforce☆82Oct 13, 2024Updated last year
- A tool to enumerate and download files from the System Center Configuration Manager (SCCM) SMB share (SCCMContentLib)☆17Jul 27, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆26Mar 11, 2025Updated last year
- Simple Bitcoin Stealer By Manipulating Clipboard☆13Nov 1, 2023Updated 2 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- Misery Loader to bypass modern EDR solutions☆18Dec 20, 2024Updated last year
- This contains common OSCP local exploits and enumeration scripts☆12Sep 18, 2015Updated 10 years ago
- Simple scripts aiding penetration testing process☆15Mar 10, 2020Updated 6 years ago
- minimalist sudo alternative: multi-user privilege escalation tool in three letters☆10Jul 5, 2022Updated 3 years ago