🔑 Open source stealer written on C#, all logs will be sent to Telegram bot.
☆79Apr 23, 2022Updated 3 years ago
Alternatives and similar repositories for StormKitty
Users that are interested in StormKitty are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ALL IN ONE Hacking Tool For Hackers☆11Dec 12, 2020Updated 5 years ago
- 🔅 Reverse shell written on python3☆14Dec 12, 2020Updated 5 years ago
- HTTPBotNet☆21Mar 21, 2025Updated last year
- 💻 Elevate, UAC bypass, privilege escalation, dll hijack techniques☆11Nov 23, 2018Updated 7 years ago
- Open-Source Ransomware As A Service for Linux, MacOS and Windows☆15Dec 20, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Extended Bitcoin Clipper from Nyan Cat☆33Aug 15, 2020Updated 5 years ago
- Runpe + DInvoke + Syscall☆16Jun 18, 2021Updated 4 years ago
- Stealer written on C#, logs will be sent to Discord Webhook.☆27Jan 27, 2022Updated 4 years ago
- Bypass Windows defender syscall☆18Jul 17, 2021Updated 4 years ago
- App Panel for Licensing Software. Simple and Secure!☆45Sep 1, 2022Updated 3 years ago
- Obfuscate Python code, stage payloads, and evade defenses☆24Apr 8, 2026Updated last week
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- ☆24Nov 23, 2019Updated 6 years ago
- Cryptocurrency wallet decryption program written in C# .NET 7.0☆20Dec 9, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A repository of LIVE malwares for your own joy and pleasure☆16Apr 21, 2016Updated 9 years ago
- Leaked Mirai Source Code for Research/IoC Development Purposes☆16Oct 31, 2016Updated 9 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- A Free Silent (Hidden) Open-Source Native Binder - Includes Windows Defender Bypass - Unam Binder☆278Aug 1, 2022Updated 3 years ago
- ☆19Mar 21, 2020Updated 6 years ago
- 一个普通的BOF用来BypassUAC☆22Apr 6, 2024Updated 2 years ago
- ☆56Sep 26, 2024Updated last year
- An open-source, centralized HTTPS botnet☆174Dec 10, 2022Updated 3 years ago
- Browser and apps data stealer☆25Jan 1, 2024Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆20Jul 23, 2023Updated 2 years ago
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Dec 16, 2021Updated 4 years ago
- A simple and stable deobfuscator for ZenFuscator☆17Oct 7, 2023Updated 2 years ago
- Brand New Code Injection for Windows☆13Oct 28, 2016Updated 9 years ago
- ransomware chiffre tous les fichiers,télécharge une image depuis un serveur distant puis change le fond d'ecran après le chiffrement des …☆26Feb 19, 2021Updated 5 years ago
- Yahoo Email Valid Checker V1 By ARON-TN☆42Feb 21, 2023Updated 3 years ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Jul 27, 2022Updated 3 years ago
- ☆22Aug 1, 2022Updated 3 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ⚡ Create infinite UAC prompts forcing a user to run as admin ⚡☆248Sep 23, 2022Updated 3 years ago
- Archive of leaked Equation Group materials☆17Aug 17, 2016Updated 9 years ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆16Aug 4, 2023Updated 2 years ago
- Windows RPC example calling stubs generated from MS-LSAT and MS-LSAD☆28Jan 4, 2024Updated 2 years ago
- This tool is a discord autospreader, meaning once infected it will grab the token of anyone on the pc, grab their friends, and send itsel…☆34Apr 28, 2022Updated 3 years ago
- This program uses the discord.net library to rat (remote access trojan) your victims computer. You can control it in a discord server and…☆22Jul 14, 2022Updated 3 years ago
- browser passwords/credit card steal; utilizes discord's webhooks to send information directly to discord.☆22Dec 8, 2020Updated 5 years ago