Simple C# malware that steals Discord token from .ldb files and from memory
☆61Oct 27, 2021Updated 4 years ago
Alternatives and similar repositories for DeadLight
Users that are interested in DeadLight are comparing it to the libraries listed below
Sorting:
- Hook system calls on Windows by using Kaspersky's hypervisor☆17Dec 25, 2024Updated last year
- Simple x86 Trampoline Hook☆44Aug 3, 2022Updated 3 years ago
- simple shellcode injector☆118Aug 4, 2022Updated 3 years ago
- simple C++ dll injector☆61Jan 13, 2022Updated 4 years ago
- Bypass Malware Sandbox Evasion Ram check☆141Jan 3, 2023Updated 3 years ago
- Cleny is An Interpreted Coding Language Used To Facilitate UI Structuring And Styling For CLI Based Projects☆108Dec 30, 2022Updated 3 years ago
- APT38 Tactic PoC for Stealing 0days from security researchers☆325May 30, 2025Updated 9 months ago
- Mass exploitation of CVE-2021-24499 unauthenticated upload leading to remote code execution in Workreap theme.☆16Sep 20, 2021Updated 4 years ago
- Ray-casting game for wasting productive time.☆11May 23, 2021Updated 4 years ago
- simple user-mode Rootkit☆109Oct 24, 2022Updated 3 years ago
- penetration testing utilities☆10Mar 30, 2021Updated 4 years ago
- 42 header for neovim made with lua☆11Aug 17, 2022Updated 3 years ago
- The Hack3r News B'darija☆18Jan 1, 2023Updated 3 years ago
- Boilerplate of a RESTful API☆32May 9, 2021Updated 4 years ago
- a collection of elf file infectors☆27Oct 10, 2021Updated 4 years ago
- ☆31Jul 6, 2025Updated 8 months ago
- linux debugger☆11Sep 29, 2023Updated 2 years ago
- Ressources for following my youtube C tutorials☆13Jun 25, 2021Updated 4 years ago
- Restful Api developed with Flask using Prometheus and Grafana for monitoring and containerization with Docker☆16Jul 13, 2023Updated 2 years ago
- Simple API Hooks detector☆77Aug 22, 2022Updated 3 years ago
- An open source standard C library that includes useful functions (Refactoring some libc functions + our own functions).☆11Nov 14, 2021Updated 4 years ago
- The dining philosophers problem is an example problem often used in concurrent algorithm design to illustrate synchronization issues and …☆12Aug 30, 2021Updated 4 years ago
- It's good to be back!☆36Nov 23, 2021Updated 4 years ago
- Direct syscalls Injection to bypass AV/EDR☆11May 18, 2024Updated last year
- ☆18Sep 11, 2025Updated 6 months ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- Resilient, Stealthy & Capable Windows Backdoor. Utilizing Telegram for command relays☆13Feb 12, 2023Updated 3 years ago
- Moulinette program to test your piscine assessements, this tester is not that similar to the 42-moulinette implementation, therefore you …☆15Jun 6, 2022Updated 3 years ago
- Open source linux-based-toolkit for basic cyber security students, social engineers, linux users....☆22Oct 2, 2023Updated 2 years ago
- Discord Token Stealer Malware Protection☆21Dec 12, 2021Updated 4 years ago
- ☆32Nov 22, 2022Updated 3 years ago
- Bypass Malware Time Delays☆107Sep 23, 2022Updated 3 years ago
- Sort data on a stack with a limited set of instructions.☆10Apr 21, 2022Updated 3 years ago
- A roblox cookie logger that logs a person info and passwords, supports edge, google chrome and most browsers☆13Aug 1, 2023Updated 2 years ago
- The malware is un-killable and fully undetectable by antivirus, developed by Kingsman. It steals the browser passwords, Discord Tokens & …☆61Jul 11, 2021Updated 4 years ago
- A collection of Vulnerable Windows Drivers☆16Dec 4, 2021Updated 4 years ago
- A chrome extension to automatically close stackoverflow and google tabs after you're done troubleshooting/fixing a bug☆24Mar 26, 2022Updated 3 years ago
- A docker image contains tools for developing and debuging your 42 projects.☆22Mar 25, 2022Updated 3 years ago
- One of the best Grabbers to get the Passwords, Cookies and tokens from your friends ;)☆10Aug 29, 2023Updated 2 years ago