LimerBoy / Soviet-ThiefLinks
Yandex browser passwords and credit-cards decryption algorithm
☆22Updated 9 months ago
Alternatives and similar repositories for Soviet-Thief
Users that are interested in Soviet-Thief are comparing it to the libraries listed below
Sorting:
- My POC implementation of HVNC (Hidden VNC / Hidden Desktop)☆28Updated last year
- Decrypting yandex browser passwords☆27Updated 9 months ago
- Troll TaskManager, and play with it .☆30Updated 5 months ago
- A unique introduction to native runtime obfuscation.☆74Updated 10 months ago
- A Free Open sourced crypter that builds a output .NET .exe Stub (Updated whenever I feel like it)☆20Updated 3 months ago
- EDR & AV Bypass Arsenal— a comprehensive collection of tools, patches, and techniques for evading modern EDR and antivirus defenses.☆50Updated 2 months ago
- The best powershell obfuscator ever made☆119Updated 5 months ago
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to ne…☆27Updated 8 months ago
- Ransomware written in go, encrypt - decrypt.☆30Updated 9 months ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆101Updated last year
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆136Updated last year
- Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.☆128Updated last month
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆72Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆90Updated 9 months ago
- A WIP shellcode loader tool which bypasses AV/EDR, coded in C++, and equipped with a minimal builder.☆84Updated 4 months ago
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆18Updated 8 months ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆99Updated 11 months ago
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆166Updated last year
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆103Updated 11 months ago
- Proof of Concepts code for Bring Your Own Vulnerable Driver techniques☆203Updated 5 months ago
- Injecting DLL into LSASS at boot☆156Updated 8 months ago
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆44Updated last year
- Educational proof-of-concept demonstrating DEP/NX bypass using hardware breakpoints, vectored exception handling, and instruction emulati…☆96Updated 3 months ago
- A runtime Crypter written in C++ to bypass AVs signature based detection☆40Updated 2 years ago
- Dynamic shellcode loader with sophisticated evasion capabilities☆279Updated 3 months ago
- Generate an Alphabetical Polymorphic Shellcode☆135Updated 5 months ago
- Obfuscating function calls using Vectored Exception Handlers by redirecting execution through exception-based control flow. Uses byte swa…☆111Updated 2 months ago
- kernel-mode DLL Injector☆124Updated 9 months ago
- PandaCrypter is a C#-based tool designed to convert PowerShell scripts into obfuscated batch files (.bat) with encryption and additional …☆44Updated 5 months ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Updated last year