SecUser1 / PredatorTheStealerLinks
C++ stealer (passwords, cookies, forms, cards, wallets)
☆12Updated 2 years ago
Alternatives and similar repositories for PredatorTheStealer
Users that are interested in PredatorTheStealer are comparing it to the libraries listed below
Sorting:
- C++ stealer (passwords, cookies, forms, cards, wallets)☆12Updated 2 years ago
- POC Ring3 Windows Rootkit (x86 / x64) - Hide processes and files☆59Updated 2 years ago
- Botnet system from deep-web Russians forums. Tiny Nuke!☆92Updated 8 years ago
- Fud Runpe Av Evasion / All Av Bypass☆33Updated 2 years ago
- simple user-mode Rootkit☆107Updated 2 years ago
- Криптор на шелл-кодах☆11Updated 5 years ago
- Advanced Keylogger / Info Grabber written in C++.☆33Updated 6 months ago
- My POC implementation of HVNC (Hidden VNC / Hidden Desktop)☆27Updated 9 months ago
- A win32 exe packer☆48Updated 5 years ago
- Multi-component Remote Access Trojan: C++ client (victim), C# server, and Angular frontend.☆35Updated 5 months ago
- Reverse Socks5 proxy for windows☆16Updated 3 years ago
- Header only library for obfuscation import winapi functions.☆43Updated 8 months ago
- Kernel Security driver used to block past, current and future process injection techniques on Windows Operating System.☆154Updated 3 years ago
- C++ self-Injecting dropper based on various EDR evasion techniques.☆408Updated last year
- Windows PE Signature Thief in C++☆51Updated 5 years ago
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆158Updated 2 years ago
- Load static-compiled PE from remote server.☆67Updated 3 years ago
- Windows API Call Obfuscation☆109Updated 2 years ago
- Uses Threat-Intelligence ETW events to identify shellcode regions being hidden by fluctuating memory protections☆148Updated 2 years ago
- Conti Ransomware Source Code☆20Updated 3 years ago
- Block any Process to open HANDLE to your process , only SYTEM is allowed to open handle to your process ,with that you can avoid remote m…☆171Updated 2 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆32Updated 5 years ago
- Conti Locker source code☆196Updated 3 years ago
- User Mode Windows Rootkit☆67Updated last year
- NanoCore rat stub source code☆38Updated 3 years ago
- Various Process Injection Techniques☆158Updated 3 years ago
- ☆20Updated 2 years ago
- CaveCarver - PE backdooring tool which utilizes and automates code cave technique☆229Updated 2 years ago
- Shellcodev is a tool designed to help and automate the process of shellcode creation.☆111Updated 2 years ago
- Cross-platform SOCKS5 proxy server program/library written in C that can also reverse itself over a firewall.☆32Updated 3 years ago