Simple keylogger on C++ with several functions.
☆16Jun 19, 2020Updated 5 years ago
Alternatives and similar repositories for stealer
Users that are interested in stealer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Command-line Remote Access Tool (RAT)☆13Jul 1, 2020Updated 5 years ago
- A Cross-Platform (Windows/Linux [Soon to be available on MAC]) Remote Administration Tool.☆10Mar 12, 2021Updated 5 years ago
- ☆28Jul 14, 2022Updated 3 years ago
- (Windows/Linux/Mac) Remote Administration Tool☆67Feb 28, 2021Updated 5 years ago
- Get/dump chrome and firefox saved passwords.☆20Sep 13, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆16Mar 21, 2026Updated last month
- Persistent & Undetectable Malware Backdoor☆28May 8, 2024Updated 2 years ago
- Python Remote Administration Tool With GUI☆18Jun 6, 2023Updated 2 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆19Jan 28, 2022Updated 4 years ago
- This is a RAT/Backdoor written in C++☆42Dec 30, 2020Updated 5 years ago
- Silent file loader☆14Apr 24, 2022Updated 4 years ago
- Based on the Shodan API, it displays the open ports and security vulnerabilities of the server related to the entered ip or hostname.☆15Apr 17, 2021Updated 5 years ago
- Virus Maker by Black Host☆15Apr 10, 2020Updated 6 years ago
- Program bypasses the UAC prompt for Admin privileges when running a program.☆16Nov 24, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- website admin panel finder☆34Dec 29, 2020Updated 5 years ago
- .NET 4.5 Remote Access Tool (RAT) implementation with Telegram's API as server☆12Jul 29, 2022Updated 3 years ago
- Simple class to search and upload files☆28Aug 13, 2019Updated 6 years ago
- It's a bash (unix shell) encrypted, mutant and polymorphic virus.☆10Aug 23, 2022Updated 3 years ago
- Remote Administration Tool For Windows☆13Apr 27, 2018Updated 8 years ago
- USBNinja steals all Wifi SSID's and passwords that a computer has been connected to and sends them to a mail by choice. Works on Windows …☆21Nov 26, 2019Updated 6 years ago
- Venom is a collaborative C2 framework used by Red Team operators. providing an interactive Web GUI written in Python and PowerShell.☆20Jul 14, 2022Updated 3 years ago
- the assembly shell and backdoor Trojan☆18Dec 19, 2021Updated 4 years ago
- 👨🏻💻 A great tool for Ethical Hackers, a malware programmed with Backdoor and Keylogger.☆45Nov 5, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Hollywood-style CCTV hacking - PoC☆40May 30, 2020Updated 5 years ago
- Simple console based Windows key-logger created in C++☆15Nov 5, 2021Updated 4 years ago
- HTTPS GET RAT and Memory Loader☆26Jun 10, 2025Updated 10 months ago
- A Python backdoor for spying on Windows machines☆10Apr 21, 2022Updated 4 years ago
- A batch script for taking information. A bit overdeveloped, and kind of useless.☆39Apr 1, 2023Updated 3 years ago
- Multifunctional keylogger using WinAPI and libcurl☆16Sep 9, 2021Updated 4 years ago
- An advance keylogger that works and also logs special keys.☆16May 27, 2022Updated 3 years ago
- ☠ 😈 👀 Simple,Secure & Undetected (6.11.2017) keylogger for Windows :)☆47Jan 16, 2018Updated 8 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18May 16, 2018Updated 7 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Extended Bitcoin Clipper from Nyan Cat☆34Aug 15, 2020Updated 5 years ago
- ADR is a trojan that retrieves all information on the computer and all data stored in applications using chormuim. It recovers cookies, t…☆27Sep 5, 2023Updated 2 years ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆20Jun 28, 2022Updated 3 years ago
- CloudflaredRAT is a simple combination of popular open-source tools, wrapping a local-facing shell with Cloudflares Argo Tunnel in an exe…☆13Oct 30, 2020Updated 5 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆22May 15, 2022Updated 3 years ago
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆118Aug 11, 2020Updated 5 years ago