This is a File Stealer written in Python. As of the 07/05/23, this is undetectable in virus total. This is designed as powerful file stealer to steal all the files from a victims computer and then forwards the files to a discord webhook
☆28May 8, 2023Updated 2 years ago
Alternatives and similar repositories for Python-File-Stealer
Users that are interested in Python-File-Stealer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A python trojan with spyware, info stealing and ransomware abilities.☆34Sep 12, 2025Updated 7 months ago
- A Powerful Token Stealer! Discord Token Grabber , Password Stealer, Cookie Stealer, File Stealer, Crypto wallet Stealer☆17Apr 13, 2023Updated 3 years ago
- Steal Files in Termux☆31Dec 11, 2020Updated 5 years ago
- Good python obfuscator☆11Aug 20, 2022Updated 3 years ago
- Decompiler and deobfuscator that offers support to track discord webhooks inside: blank stealer, luna grabber, thiefcat, Creal and all un…☆114Nov 11, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- An advanced business-ready bot built for finance-related Discord servers☆11Sep 6, 2024Updated last year
- Source code of TrojanXD☆14Feb 11, 2022Updated 4 years ago
- A Hacking and Pentesting Tool for Windows☆20Jul 17, 2025Updated 9 months ago
- This is a simple python script to allow you to generate a lot of Spotify accounts, this version gives you a little bit more customization…☆11Oct 4, 2022Updated 3 years ago
- Some stuff for PHD2021☆14May 21, 2025Updated 11 months ago
- This is a simple and functional ESP (Extra Sensory Perception) cheat for CS2 that allows you to see enemies through walls. The cheat work…☆21Mar 29, 2025Updated last year
- Please. Do not run this file on your or another computer !!! Use this file for educational purposes only !!! I am not responsible for the…☆13Dec 17, 2020Updated 5 years ago
- It's a bash (unix shell) encrypted, mutant and polymorphic virus.☆10Aug 23, 2022Updated 3 years ago
- A Minecraft session stealer involving authentication grabbing, with multiple OS support.☆24Jul 12, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- There are many powerful viruses 💀 that can damage your PC in a matter of seconds. Batch file virus to gain full access to another comput…☆51Mar 7, 2021Updated 5 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- One-time invite link generator for discord☆15Dec 24, 2023Updated 2 years ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆24Aug 5, 2025Updated 9 months ago
- make virus without coding☆12Apr 7, 2020Updated 6 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Oct 21, 2023Updated 2 years ago
- Beacon Object File (BOF) for identifying dependent child services of a given parent.☆19Jun 20, 2025Updated 10 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- ☆20Jan 8, 2026Updated 3 months ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- F5 Service Password Decryption☆29Jul 31, 2025Updated 9 months ago
- Simple And Easy Batch Obfuscator Made In Python V3.11.2 For Your Daily Use With Batch To Just Make Things Easy On Yourself Making Sure Th…☆31Mar 3, 2025Updated last year
- string encryption in Nim☆19Jun 15, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- API for create an spotify account☆14Aug 4, 2023Updated 2 years ago
- ☆14Jul 18, 2019Updated 6 years ago
- Admin Panel Bruteforce☆83Oct 13, 2024Updated last year
- A tool to enumerate and download files from the System Center Configuration Manager (SCCM) SMB share (SCCMContentLib)☆17Jul 27, 2024Updated last year
- ☆26Mar 11, 2025Updated last year
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- Misery Loader to bypass modern EDR solutions☆19Dec 20, 2024Updated last year