Simple keylogger on C++ with several functions.
☆16Jun 19, 2020Updated 5 years ago
Alternatives and similar repositories for stealer
Users that are interested in stealer are comparing it to the libraries listed below
Sorting:
- Command-line Remote Access Tool (RAT)☆13Jul 1, 2020Updated 5 years ago
- ☆29Jul 14, 2022Updated 3 years ago
- A Cross-Platform (Windows/Linux [Soon to be available on MAC]) Remote Administration Tool.☆10Mar 12, 2021Updated 4 years ago
- (Windows/Linux/Mac) Remote Administration Tool☆66Feb 28, 2021Updated 5 years ago
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆16Dec 14, 2020Updated 5 years ago
- Python Remote Administration Tool With GUI☆18Jun 6, 2023Updated 2 years ago
- Persistent & Undetectable Malware Backdoor☆28May 8, 2024Updated last year
- 👨🏻💻 A great tool for Ethical Hackers, a malware programmed with Backdoor and Keylogger.☆45Nov 5, 2020Updated 5 years ago
- website admin panel finder☆34Dec 29, 2020Updated 5 years ago
- Android backdoored app, improved source code of msfvenom android .apk☆12May 31, 2019Updated 6 years ago
- AES Ransomware in batch☆11Jun 25, 2024Updated last year
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- Python Keylogger PortScanner BruteForce and basic hack tools.(new ones will come soon)☆18Mar 30, 2021Updated 4 years ago
- Extended Bitcoin Clipper from Nyan Cat☆32Aug 15, 2020Updated 5 years ago
- It's a bash (unix shell) encrypted, mutant and polymorphic virus.☆10Aug 23, 2022Updated 3 years ago
- Documentación sobre sistemas embebidos☆12Nov 15, 2024Updated last year
- Exploits for TRENDNet routers☆13Apr 21, 2020Updated 5 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 4 years ago
- A Python backdoor for spying on Windows machines☆10Apr 21, 2022Updated 3 years ago
- Local File Inclusion (LFI) in FHEM 6.0 allows an attacker to include a file, it can lead to sensitive information disclosure.☆12Jan 20, 2021Updated 5 years ago
- A conglomeration of resources for any color of the rainbow☆14Feb 12, 2026Updated 3 weeks ago
- ☆11Dec 13, 2021Updated 4 years ago
- .NET 4.5 Remote Access Tool (RAT) implementation with Telegram's API as server☆11Jul 29, 2022Updated 3 years ago
- best tool for hacking via windows cmd☆13Jan 4, 2019Updated 7 years ago
- ☆11Jul 5, 2016Updated 9 years ago
- Get latest Exploit Databases notification on your Desktop☆16Jan 29, 2020Updated 6 years ago
- A tool to list plugins installed on a wordpress powered website.☆11Jun 20, 2024Updated last year
- A batch script for taking information. A bit overdeveloped, and kind of useless.☆39Apr 1, 2023Updated 2 years ago
- Remote Administration Tool For Windows VB.NET☆12Mar 19, 2019Updated 6 years ago
- IDS/IPS malware download evasion☆15Feb 21, 2019Updated 7 years ago
- Fastly scans open ports on large networks and bruteforce login mechanism of found services☆12Aug 24, 2019Updated 6 years ago
- ☆13Aug 20, 2021Updated 4 years ago
- ☆13Oct 22, 2019Updated 6 years ago
- IcosaSwitch is an All-In-One Switch Hacking applications☆17Sep 19, 2021Updated 4 years ago
- A localhost implementation of a botnet used to perform a credential stuffing attack☆13Jan 14, 2021Updated 5 years ago
- FTP-like interface over S3 to allow auth users (OAuth, SAML) manage files under some buckets and folders, with normal users and admins.☆11Oct 25, 2020Updated 5 years ago
- Relay Node for the Tox Network☆10Jan 1, 2018Updated 8 years ago
- Tool to use Nmap, in Flask with different types of scans. 👁☆14Sep 11, 2025Updated 5 months ago
- Own linux scripts and configurations☆14Feb 12, 2025Updated last year