LimerBoy / Soviet-ThiefLinks
Yandex browser passwords and credit-cards decryption algorithm
☆15Updated 2 months ago
Alternatives and similar repositories for Soviet-Thief
Users that are interested in Soviet-Thief are comparing it to the libraries listed below
Sorting:
- My POC implementation of HVNC (Hidden VNC / Hidden Desktop)☆23Updated 5 months ago
- Decrypting yandex browser passwords☆21Updated 2 months ago
- Ransomware written in go, encrypt - decrypt.☆25Updated 2 months ago
- A Free Open sourced crypter that builds a output .NET .exe Stub (Updated whenever I feel like it)☆15Updated last month
- Fud Runpe Av Evasion / All Av Bypass☆33Updated 2 years ago
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to ne…☆18Updated last month
- Retrieve the Chrome App Bound key using DLL injection — no administrator privileges required and no need to run from the chrome folder in…☆30Updated 2 months ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆70Updated last year
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆72Updated last year
- Stealer in c++.☆42Updated 2 months ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆62Updated 4 months ago
- Test antiviruses☆12Updated last year
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆90Updated last year
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Updated last year
- Research into removing strings & API call references at compile-time (Anti-Analysis)☆27Updated last year
- Section-based payload obfuscation technique for x64☆61Updated 10 months ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆92Updated 8 months ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆56Updated 3 weeks ago
- 💎 | RubyRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Ruby☆10Updated 2 months ago
- ☆36Updated 9 months ago
- Криптор на шелл-кодах☆9Updated 5 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆42Updated last year
- Unhook Ntdll.dll, Go & C++.☆24Updated 2 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆69Updated 2 months ago
- The best powershell obfuscator ever made☆109Updated 2 months ago
- ATL.dll and WmiMgmt.msc UAC Bypass☆12Updated 2 months ago
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆64Updated 2 years ago
- kernel-mode DLL Injector☆85Updated 2 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆73Updated 10 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆50Updated last year