MalwareLeaks / BitRAT---SSL-TOR-C-KEYLOGGER-HIDDEN-BROWSER-XMR-MINER-PASSWORDS-hVNCView external linksLinks
BitRat 1.39 Cracked & Offline Builder
☆11Mar 5, 2022Updated 3 years ago
Alternatives and similar repositories for BitRAT---SSL-TOR-C-KEYLOGGER-HIDDEN-BROWSER-XMR-MINER-PASSWORDS-hVNC
Users that are interested in BitRAT---SSL-TOR-C-KEYLOGGER-HIDDEN-BROWSER-XMR-MINER-PASSWORDS-hVNC are comparing it to the libraries listed below
Sorting:
- Conti Ransomware malware leak WITH LOCKER☆24Mar 5, 2022Updated 3 years ago
- A program to steal user information through a simple link☆14May 19, 2023Updated 2 years ago
- Replace any BTC, XMR, XLM, ETH, XRP, LTC, BCH, NEC, ZCASH, DASH, DOGE, WMR, WMG, WMX, Yandex money, Qiwi address to yours☆37May 1, 2021Updated 4 years ago
- CloudflaredRAT is a simple combination of popular open-source tools, wrapping a local-facing shell with Cloudflares Argo Tunnel in an exe…☆14Oct 30, 2020Updated 5 years ago
- Trojan Rat Builder(310), Ransomware Builder(7), Crypter(72), Miner(9), Worm(8), Botnet(25), Virus Builder(9), Binder(25), Exploit(7), Key…☆11Sep 10, 2021Updated 4 years ago
- A project to scrape Insecam.org for open IP addresses, run a machine learning algorithms to find people/objects of interest, and save ima…☆21Nov 2, 2018Updated 7 years ago
- A javascript based botnet/C&C to remotely manage/control browsers.☆24Feb 4, 2022Updated 4 years ago
- legacy Botnets source code Forked from github.com/malwares☆27Jan 30, 2022Updated 4 years ago
- One weak transaction in ECDSA on the Bitcoin blockchain and with the help of Lattice Attack we received a Private Key to BTC coins☆31Dec 7, 2022Updated 3 years ago
- An open-source session replay tool for single-page applications that uses AI analysis, aggregated trends, and a RAG chatbot to help devel…☆11Jan 23, 2026Updated 3 weeks ago
- A Silent Miner that mines Crypto - XMR and ETH☆16Feb 5, 2023Updated 3 years ago
- A Python script that runs a machine learning analysis on data from RaiGames.io to predict the next crash.☆11Jun 21, 2022Updated 3 years ago
- Blockchain Attack Vectors & Vulnerabilities to Smart Contracts☆35Dec 27, 2022Updated 3 years ago
- conti locker ransomware source code leak☆31Mar 5, 2022Updated 3 years ago
- Keep track of a GSM device and show its location on a map☆11Apr 14, 2016Updated 9 years ago
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆129Feb 4, 2023Updated 3 years ago
- ☆10Jul 1, 2024Updated last year
- Simple Linux RootKit written in python☆10Dec 10, 2017Updated 8 years ago
- mass-contact text/SMS distribution tool☆11Apr 28, 2025Updated 9 months ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- IR remote control for my Car PC. Emulates keyboard and mouse USB HID Combo device.☆10Jan 30, 2016Updated 10 years ago
- Dart project that allows you to control the mouse and keyboard to automate interactions with other applications.☆12Nov 28, 2023Updated 2 years ago
- Original hVNC has been recoded to work with all version of windows above XP. Thanks to the original author for this wonderful tool.☆10Oct 13, 2021Updated 4 years ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- This script waits for low numbers (reds) streaks, then margintales. It also chases 19x anomalies.☆11Nov 1, 2017Updated 8 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆30May 20, 2021Updated 4 years ago
- HVNC hidden remote VNC desktop with filemanager and backconnect☆42Dec 18, 2024Updated last year
- ☆11Apr 23, 2019Updated 6 years ago
- Mis proyectos de marketing aplicando AI☆11Oct 31, 2025Updated 3 months ago
- Best Private RAT in 2022! HVNC (no shitty Tinynuke) | STEALER | | CLIPPER | | HRDP | | KEYLOGGER |☆12Sep 10, 2022Updated 3 years ago
- url manipulation☆18Dec 15, 2023Updated 2 years ago
- ☆13Nov 24, 2021Updated 4 years ago
- Hidden Features Full Hidden Access Hidden Desktop Hidden Browsers Hidden Cmd Clone Profile Hidden PowerShell Hidden Explorer Hidde…☆17Sep 30, 2022Updated 3 years ago
- ☆11Dec 9, 2024Updated last year
- C++ keylogger to save all the keys pressed into a local txt file☆11Apr 6, 2023Updated 2 years ago
- BLOCKCHAIN written in C#☆11Sep 24, 2023Updated 2 years ago
- Fully undetectable bypass for every antivirus (FUD at the moment). Works by downloading a bat file that adds an exclusion for exe files, …☆39Feb 12, 2023Updated 3 years ago
- Speed up secp256k1 with endomorphism☆14Dec 7, 2022Updated 3 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago