π Open source stealer written on C#, all logs will be sent to Telegram bot.
β79Apr 23, 2022Updated 4 years ago
Alternatives and similar repositories for StormKitty
Users that are interested in StormKitty are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ALL IN ONE Hacking Tool For Hackersβ11Dec 12, 2020Updated 5 years ago
- π Reverse shell written on python3β14Dec 12, 2020Updated 5 years ago
- π» Elevate, UAC bypass, privilege escalation, dll hijack techniquesβ11Nov 23, 2018Updated 7 years ago
- Extended Bitcoin Clipper from Nyan Catβ34Aug 15, 2020Updated 5 years ago
- Runpe + DInvoke + Syscallβ16Jun 18, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Stealer written on C#, logs will be sent to Discord Webhook.β27Jan 27, 2022Updated 4 years ago
- Bypass Windows defender syscallβ18Jul 17, 2021Updated 4 years ago
- App Panel for Licensing Software. Simple and Secure!β45Sep 1, 2022Updated 3 years ago
- Obfuscate Python code, stage payloads, and evade defensesβ24Apr 19, 2026Updated 2 weeks ago
- Process injection via KernelCallbackTableβ13Jan 28, 2022Updated 4 years ago
- β24Nov 23, 2019Updated 6 years ago
- Minecraft session stealer for the new launcherβ10Dec 21, 2020Updated 5 years ago
- Cryptocurrency wallet decryption program written in C# .NET 7.0β20Dec 9, 2024Updated last year
- β11Dec 8, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits β’ AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A repository of LIVE malwares for your own joy and pleasureβ16Apr 21, 2016Updated 10 years ago
- Leaked Mirai Source Code for Research/IoC Development Purposesβ16Oct 31, 2016Updated 9 years ago
- Malware persistence via COM DLL hijacking. C++ implementation exampleβ13May 2, 2022Updated 4 years ago
- A Free Silent (Hidden) Open-Source Native Binder - Includes Windows Defender Bypass - Unam Binderβ278Aug 1, 2022Updated 3 years ago
- Netflix Email Valid Checker V1 By ARON-TNβ36Feb 21, 2023Updated 3 years ago
- β19Mar 21, 2020Updated 6 years ago
- β57Sep 26, 2024Updated last year
- An open-source, centralized HTTPS botnetβ173Dec 10, 2022Updated 3 years ago
- Browser and apps data stealerβ26Jan 1, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer β’ AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- β20Jul 23, 2023Updated 2 years ago
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.β10Dec 16, 2021Updated 4 years ago
- Toolset for detecting reflected xss in websitesβ16Oct 6, 2018Updated 7 years ago
- A simple and stable deobfuscator for ZenFuscatorβ17Oct 7, 2023Updated 2 years ago
- Brand New Code Injection for Windowsβ13Oct 28, 2016Updated 9 years ago
- A HTTP bot in Java with basic commands and ability'sβ10Aug 20, 2015Updated 10 years ago
- ransomware chiffre tous les fichiers,tΓ©lΓ©charge une image depuis un serveur distant puis change le fond d'ecran aprΓ¨s le chiffrement des β¦β26Feb 19, 2021Updated 5 years ago
- Yahoo Email Valid Checker V1 By ARON-TNβ42Feb 21, 2023Updated 3 years ago
- π§ C# UAC Bypass technique using mock directories π§β28Jul 27, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer β’ AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- β22Aug 1, 2022Updated 3 years ago
- β£οΈ Necro Stealer + Web Panelβ10May 2, 2020Updated 6 years ago
- β‘ Create infinite UAC prompts forcing a user to run as admin β‘β248Sep 23, 2022Updated 3 years ago
- Host CLR and run .NET binaries using Rustβ154Dec 23, 2025Updated 4 months ago
- Archive of leaked Equation Group materialsβ15Aug 17, 2016Updated 9 years ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORKβ16Aug 4, 2023Updated 2 years ago
- This tool is a discord autospreader, meaning once infected it will grab the token of anyone on the pc, grab their friends, and send itselβ¦β34Apr 28, 2022Updated 4 years ago