jacques-andre / crypto-yank
crypto-yank matches and replaces crypto-currency addresses found in the clipboard.
☆89Updated 2 months ago
Related projects: ⓘ
- ☆133Updated this week
- Phishlets for Evilginx2 (MITM proxy Framework)☆145Updated 4 years ago
- A simple script to generate a hidden url for social engineering.☆122Updated 4 years ago
- Ro3b - Advance Banking HTTP Botnet☆45Updated last year
- ☆80Updated this week
- Disclaimer :- I am not promoting any illegal activity here . this is purely for educational purpose . i am not responsible if you use it …☆46Updated last year
- Advanced phishing tool used for session & credential grabbing and bypassing 2FA using man-in-the-middle attack with standalone reverse p…☆78Updated last year
- Big-Papa is a remote cookie stealer which can then be used for session hijacking and Bypassing 2 Factor Authentication☆100Updated 2 years ago
- Crypter in Python 3 with advanced functionality, Bypass VM, Encrypt Source with AES & Base64 Encoding | Evil Code is executed by brutefor…☆328Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆104Updated 3 years ago
- NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive K…☆116Updated 8 months ago
- A automated monero mining (injector) scripts which mines monero for you in targeted system☆55Updated last month
- ☆81Updated this week
- ☆68Updated this week
- Telegram RAT written in Python☆108Updated last year
- Hidden miner builder☆102Updated 2 years ago
- Ransomware builder☆83Updated 4 years ago
- ☆104Updated this week
- Multi-client Cross-platform Python Backdoor/Reverse Shell/RAT with AES Encryption☆71Updated 2 months ago
- POC Bitcoin stealer☆84Updated 6 years ago
- Backdoor Generator | Linux & Windows | FUD AV .py .exe☆103Updated 4 years ago
- Scan the entire internet for SSH and Telnet services. Then hack them.☆76Updated 2 years ago
- ☆136Updated this week
- Create a fully undetectable backdoor with simple steps.☆72Updated 2 years ago
- [NEW] : Mega Bot ☣ Scanner & Auto Exploiter☆121Updated 4 years ago
- blackhole is a ransomware coded in c#☆26Updated 4 years ago
- XSS cookie stealer using JavaScript and PHP☆56Updated 5 years ago
- ☆48Updated this week
- Crappy cookie stealer☆92Updated 3 years ago
- Spoof file icons and extensions in Windows☆169Updated last week