idfp / go-stealer
Cookie & Logins stealer for Firefox + Chrome, demonstration only
☆11Updated last year
Alternatives and similar repositories for go-stealer:
Users that are interested in go-stealer are comparing it to the libraries listed below
- A simple go Proof of Concept to start a new shell as TrustedInstaller☆52Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆53Updated 6 months ago
- Go ransomware utilising ChaCha20 and ECIES encryption.☆58Updated this week
- Write-ups and proof of concepts of design and implementaion of various modern malwares.☆25Updated last year
- RegStrike is a .reg payload generator☆57Updated last year
- Malicious powershell scripts loader designed to avoid detection.☆38Updated last year
- ☆106Updated last year
- Collection of malleable payloads and tools that will bypass AMSI, Windows Defender, and self-signed certificate checks.☆23Updated 9 months ago
- Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠☆100Updated this week
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆20Updated 2 years ago
- C or BOF file to extract WebKit master key to decrypt user cookie☆183Updated 8 months ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆111Updated last year
- malware written for educational purposes☆61Updated 2 months ago
- A C2 framework built for my bachelors thesis☆55Updated 2 months ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆125Updated 2 months ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆37Updated 8 months ago
- UAC Bypass using CMSTP in Rust☆22Updated last month
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆176Updated last year
- Ransomware written in go, encrypt - decrypt.☆16Updated 6 months ago
- .bin file to shellcode convertor☆31Updated 6 months ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆66Updated last year
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆92Updated last week
- Windows Thread Pool Injection Havoc Implementation☆28Updated 9 months ago
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- ☆29Updated last year
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆70Updated 10 months ago
- Run Your Payload Without Running Your Payload☆179Updated 2 years ago
- This repo is for the youtube video where we have explained how to make a detectable reverse shell undetectable by windows defender☆26Updated 10 months ago