Divulge Stealer a highly advanced info-stealer that outperforms its predecessor, Umbral-Stealer by Blank-c. This new iteration is a complete overhaul with enhanced capabilities, targeting 25 major cryptocurrency wallets with precision.
☆16Jan 7, 2025Updated last year
Alternatives and similar repositories for Divulge-Stealer
Users that are interested in Divulge-Stealer are comparing it to the libraries listed below
Sorting:
- HYDRAX, Advanced Malware Generation, Stealth and Evasion Techniques, Exploit Development, Botnet Command and Control (C&C), Payload Custo…☆25Dec 9, 2024Updated last year
- Bypass Windows Defender with py2exe from memory.☆40Feb 10, 2022Updated 4 years ago
- A C++/Asm template for PIC/EXE/DLL malware☆24Aug 12, 2025Updated 7 months ago
- Js File Scanner☆11Mar 30, 2021Updated 4 years ago
- Simple Ransomware using Python PyQt5 and Cryptography libraries. You can make the design you want using the design files.☆14Jun 11, 2022Updated 3 years ago
- A GUI based program for making customised crypto stealing malware written in python☆47Oct 8, 2025Updated 5 months ago
- The community app for eXch.cx website☆17Nov 22, 2024Updated last year
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- Monitor collections of malicious Telegram bots used for phishing credential theft, to prevent frauds/dataleaks.☆17Jan 29, 2025Updated last year
- This lab is for **EDUCATIONAL PURPOSES ONLY**. Use it responsibly and only on systems you own or have explicit permission to test. Do not…☆17Feb 20, 2026Updated last month
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆15Apr 21, 2025Updated 10 months ago
- A simple android ransomeware tool built in python☆17Jun 27, 2021Updated 4 years ago
- ☆18Jun 25, 2024Updated last year
- Andiodine is a dns-tunneling solutions that allows you tunnel IPv4 data through a DNS server. This is very usable in different situations…☆13Apr 16, 2024Updated last year
- SQL Injection attack is the most common website hacking technique. Most websites use Structured Query Language (SQL) to interact with dat…☆12Jul 16, 2022Updated 3 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15May 15, 2024Updated last year
- ☆13May 21, 2025Updated 9 months ago
- An open-source knowledge base for security researchers.☆18Jan 8, 2025Updated last year
- deface-X is an automatic deface tool used to inject a website☆13Oct 16, 2025Updated 5 months ago
- Targeting a signal handler race condition in OpenSSH's server (sshd) on glibc-based Linux systems.☆19Jul 3, 2024Updated last year
- The Cayosin Bot features unique RHex STD and RHex HTTP attacks. Meaning that the Hex Strings are randomly selected. Cayosin also contains…☆15Sep 29, 2020Updated 5 years ago
- ☆12Jul 4, 2024Updated last year
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- ☆10Jun 15, 2024Updated last year
- An lightweight and easy to use toolbox for hackers☆12Nov 17, 2022Updated 3 years ago
- Enable-All-Tokens is a Go-based project designed to adjust and enable a list of specified privileges for the current process token on a W…☆10Apr 21, 2025Updated 10 months ago
- Pyload RCE with js2py sandbox escape☆17Oct 26, 2024Updated last year
- The easyast way to hack anything by this tool -CYBER kallan☆10Oct 15, 2019Updated 6 years ago
- X-fucknet is the best tool with full power to carry out DDOS attacks {Distributed Denial of Service}☆12Oct 16, 2025Updated 5 months ago
- ☆24Mar 14, 2026Updated last week
- ☆11Jan 2, 2022Updated 4 years ago
- dorkX is a tool to do google dork in seconds and the results will be saved in results.txt☆10Oct 16, 2025Updated 5 months ago
- ☆41Sep 9, 2023Updated 2 years ago
- Finds internet-exposed resources in an AWS account☆18Sep 1, 2024Updated last year
- A python phishing script for login phishing, image phishing, video phishing and many more☆20Mar 13, 2026Updated last week
- String-based secret-searching tool (high entropy and regexes) based on truffleHog☆17Oct 21, 2021Updated 4 years ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Apr 21, 2025Updated 10 months ago
- Collection of videos of Raids on Cybercriminals☆21Mar 19, 2025Updated last year
- Эксплойт для уязвимости CVE-2024-0039 на Android, который позволяет выполнять произвольный код через MP4 файл. Этот репозиторий создан дл…☆12May 29, 2024Updated last year