ayatul-ops / bby-stealerLinks
Fully Undetected Grabber (Grabs Wallets, Passwords, Cookies, Modifies Discord Client Etc.) Disclaimer: We are not responsible for any damages this software may cause after being acquired. This software was made for personal education and sandbox testing.
☆15Updated this week
Alternatives and similar repositories for bby-stealer
Users that are interested in bby-stealer are comparing it to the libraries listed below
Sorting:
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- A script to automate keystrokes through a graphical desktop program.☆35Updated 2 weeks ago
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆62Updated 10 months ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆22Updated 10 months ago
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆27Updated 2 years ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆35Updated 2 months ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Updated 9 months ago
- File Manager☆12Updated last month
- Vast.ai Password Kracking☆69Updated last week
- Public repo of some woking evilginx phishlets☆34Updated 7 months ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆22Updated last year
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated 2 years ago
- A small executable to trick a user to authenticate using code matching MFA☆69Updated last year
- ☆19Updated last year
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Updated 2 years ago
- A C2 framework built for my bachelors thesis☆55Updated 7 months ago
- Automated Evilginx phishlet creator Extension for Burpsuite☆52Updated 5 months ago
- This file implements a library and tool to make malicious PDF files.☆11Updated 2 years ago
- A Moodle Scanner☆42Updated 7 months ago
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- ☆35Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆18Updated 2 years ago
- Phishing Framework for OTP codes☆33Updated last month
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆31Updated 2 months ago
- exfiltration/infiltration toolkit☆23Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆106Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 8 months ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆36Updated 2 years ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆62Updated last week