Divulge Stealer a highly advanced info-stealer that outperforms its predecessor, Umbral-Stealer by Blank-c. This new iteration is a complete overhaul with enhanced capabilities, targeting 25 major cryptocurrency wallets with precision.
☆16Jan 7, 2025Updated last year
Alternatives and similar repositories for Divulge-Stealer
Users that are interested in Divulge-Stealer are comparing it to the libraries listed below
Sorting:
- HYDRAX, Advanced Malware Generation, Stealth and Evasion Techniques, Exploit Development, Botnet Command and Control (C&C), Payload Custo…☆25Dec 9, 2024Updated last year
- A C++/Asm template for PIC/EXE/DLL malware☆24Aug 12, 2025Updated 6 months ago
- A GUI based program for making customised crypto stealing malware written in python☆47Oct 8, 2025Updated 4 months ago
- ☆41Sep 9, 2023Updated 2 years ago
- VBV,OTP,Paypal,OTP,PaypalX OTP,Vemmo OTP,Cashapp OTP,,Bank OTP,Zelle OTP.Time-based OTP (TOTP) is stored on a users phone, and combined w…☆24Updated this week
- EDRcoin source☆10Mar 23, 2016Updated 9 years ago
- Bypass Windows Defender with py2exe from memory.☆40Feb 10, 2022Updated 4 years ago
- ☆12Jul 4, 2024Updated last year
- Growtopia stealer written at C# that steal save.dat, mac address, IP information, etc...☆10Aug 17, 2021Updated 4 years ago
- SQL Injection attack is the most common website hacking technique. Most websites use Structured Query Language (SQL) to interact with dat…☆12Jul 16, 2022Updated 3 years ago
- Эксплойт для уязвимости CVE-2024-0039 на Android, который позволяет выполнять произвольный код через MP4 файл. Этот репозиторий создан дл…☆12May 29, 2024Updated last year
- ATHERCRC32 Provide developers with a complete framework for using CRC32 in functions/classes in memory, and protecting your software agai…☆15Jan 29, 2021Updated 5 years ago
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- The easyast way to hack anything by this tool -CYBER kallan☆10Oct 15, 2019Updated 6 years ago
- Telegram base free Rat☆12Apr 26, 2025Updated 10 months ago
- A sophisticated GUI tool for creating malicious RAR archives that exploit the WinRAR path traversal vulnerability (CVE-2025-8088) using A…☆23Sep 4, 2025Updated 5 months ago
- X-wpbf is a wordpress bruteforce tool to find admin or user passwords via the admin login of the target website☆11Oct 16, 2025Updated 4 months ago
- dorkX is a tool to do google dork in seconds and the results will be saved in results.txt☆10Oct 16, 2025Updated 4 months ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- Fyyx Wallet Finder is a Python app that searches for cryptocurrency wallets with balances in BTC and ETH. It logs results/errors and save…☆12Jun 11, 2024Updated last year
- Microsoft decompiled IrDA drivers☆16Apr 15, 2015Updated 10 years ago
- 生异形吗?挖掘构建你自己的Java内存马!☆14May 22, 2025Updated 9 months ago
- CVE-2023-23192☆13Mar 27, 2023Updated 2 years ago
- The tool helps in quickly identifying vulnerabilities by examining a comprehensive list of potential paths on a website, making it useful…☆11Mar 24, 2025Updated 11 months ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Apr 21, 2025Updated 10 months ago
- Script-ZEC-Click-Bot-Telegram-Terbaru☆14May 5, 2020Updated 5 years ago
- This lab is for **EDUCATIONAL PURPOSES ONLY**. Use it responsibly and only on systems you own or have explicit permission to test. Do not…☆17Feb 20, 2026Updated last week
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆15Apr 21, 2025Updated 10 months ago
- deface-X is an automatic deface tool used to inject a website☆13Oct 16, 2025Updated 4 months ago
- A tool designed to increase privacy on Windows and counter malware using various techniques.☆12Apr 9, 2025Updated 10 months ago
- ☆11Jan 2, 2022Updated 4 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated last week
- Andiodine is a dns-tunneling solutions that allows you tunnel IPv4 data through a DNS server. This is very usable in different situations…☆12Apr 16, 2024Updated last year
- ☆11Jun 24, 2024Updated last year
- EasY_HaCk☆12Apr 20, 2018Updated 7 years ago
- ☆10Jun 15, 2024Updated last year
- Good CLR Host with Native patchless AMSI Bypass☆21May 14, 2025Updated 9 months ago
- Worm is an Android post exploitation Framework to gain remote access of any Android device by exploiting Android Debug Bridge.☆14Jun 7, 2024Updated last year
- Js File Scanner☆11Mar 30, 2021Updated 4 years ago