PyDevOG / Divulge-StealerLinks
Divulge Stealer a highly advanced info-stealer that outperforms its predecessor, Umbral-Stealer by Blank-c. This new iteration is a complete overhaul with enhanced capabilities, targeting 25 major cryptocurrency wallets with precision.
β11Updated 5 months ago
Alternatives and similar repositories for Divulge-Stealer
Users that are interested in Divulge-Stealer are comparing it to the libraries listed below
Sorting:
- Crypter/Stub/Downloader for payloads and malware, bypassing all AV and achiving a score of 0/60 detections on virus totalβ9Updated last year
- Payload Dropper with Persistance & Privesc & UAC bypass π±βπ€β13Updated last year
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injectionβ18Updated 2 years ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It providesβ¦β13Updated last year
- This is a working variant of the Mirai IOT botnetβ13Updated 2 years ago
- Malware Libraries focused in help Malware Developmentβ23Updated 2 years ago
- C++ Code to perform a MiniDump of lsass.exeβ34Updated last year
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.β25Updated 2 months ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current prβ¦β21Updated last year
- Tool to retrieve Config from Redline C2 serversβ16Updated 2 years ago
- PDF Icon File Type Spooferβ15Updated 11 months ago
- LSTAR - CobaltStrike Translated to ENβ17Updated 2 years ago
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch buildsβ21Updated last year
- Public repo of some woking evilginx phishletsβ34Updated 7 months ago
- UAdmin Phishlets for common sitesβ14Updated 2 weeks ago
- β25Updated 2 years ago
- My Own VirtualAlloc Implementation to use as alternative unknown for all the defense solutions of VirtualAlloc Win32 API Functionβ9Updated last year
- Simple Ransoware to attack Windows πββ21Updated 2 years ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORKβ15Updated last year
- Classic Process Injection with Memory Evasion Techniques implemantationβ70Updated last year
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defenderβ22Updated 2 years ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system cβ¦β24Updated 9 months ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.β24Updated 11 months ago
- Create a malicious pip package (PoC)β12Updated last year
- π Advanced Rat controllable by a telegram bot with many commands and functions.β16Updated last year
- β11Updated 3 months ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for locβ¦β51Updated 2 years ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysisβ62Updated 4 months ago
- Generate FUD Droppers that are undetectable by popular AV'sβ30Updated last year
- fully Undetectable payload generator for metasploitβ11Updated 2 years ago