ADR is a trojan that retrieves all information on the computer and all data stored in applications using chormuim. It recovers cookies, tokens, passwords and saved bank cards. This malware is undetectable by Windows Defender, Chrome, Virustotal (4/71).
☆26Sep 5, 2023Updated 2 years ago
Alternatives and similar repositories for ADR
Users that are interested in ADR are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Remote Administration Tool☆13Jul 9, 2023Updated 2 years ago
- Really useful hacking tools.☆19Dec 16, 2023Updated 2 years ago
- Undetected Mlbb Hack☆11Sep 2, 2024Updated last year
- Deobfuscator for : https://github.com/Blank-c/BlankOBF☆14Aug 21, 2023Updated 2 years ago
- Telegram-based PowerShell Runspace Host☆11Dec 8, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- This tool is for "educational" purpose only, and I am not responsible for any damage caused by it in any way!☆12May 2, 2023Updated 2 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆15Mar 10, 2017Updated 9 years ago
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆13Jul 14, 2022Updated 3 years ago
- C# API for Nidhogg rootkit☆21Apr 25, 2024Updated last year
- Plunge into the depths of the web with Linkscraper! Uncover links, images, emails, and more swiftly, catering to researchers, developers,…☆11Nov 9, 2024Updated last year
- This is a plugin for the c# R.A.T server providing extension to android based phone systems☆20Mar 2, 2018Updated 8 years ago
- Grab discord tokens using a fake nitro QR code.☆16Apr 24, 2023Updated 2 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Oct 21, 2023Updated 2 years ago
- ☆11Jul 13, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- MappingInjection via csharp☆40Nov 19, 2021Updated 4 years ago
- A FUD Rust Dropper☆15Feb 4, 2023Updated 3 years ago
- NoSecerets is a python script that is designed to crack hashes extremely fast. Faster even than Hashcat☆11Mar 13, 2022Updated 4 years ago
- A free, completely open-source and powerful selfbot allowing you to fully reach the potential of Discord. Includes numerous commands desi…☆26Jul 19, 2023Updated 2 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆21Jul 9, 2022Updated 3 years ago
- Advanced Android and System Hacking Tool . This tool used for some Cyber Attacks in System This Tool used for educational purpose and Thi…☆34Apr 14, 2025Updated 11 months ago
- Hack whatsapp web☆10Jul 1, 2018Updated 7 years ago
- CVE-2022-22947_POC_EXP☆13Mar 17, 2022Updated 4 years ago
- Cerberos Is A Tool Wich Has Over 50+ Functions. Cerberos Uses Discord as C2.☆17Jan 7, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Web shell generation tool written in go☆12Feb 28, 2023Updated 3 years ago
- Download a payload and make it run from registry without droppng.☆110Apr 9, 2019Updated 6 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆23Jun 15, 2020Updated 5 years ago
- Simple keylogger on C++ with several functions.☆16Jun 19, 2020Updated 5 years ago
- A powerful Remote Administration Tool that uses Discord as C2. This means you can control your devices through Discord.☆59Jan 21, 2024Updated 2 years ago
- Installation: Install the NetHunter-Store app from: https://store.nethunter.com/ From the Kali NetHunter Store, install Termux, NetHunt…☆16Dec 18, 2021Updated 4 years ago
- Bitcoin miner runs at the possible highest speed your pc can handle☆11Nov 1, 2022Updated 3 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- A cross-platform remote administration tool written in Java☆19Aug 26, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Locate device location using Social engineering☆18Sep 30, 2022Updated 3 years ago
- 简单版的PE加载器☆12Aug 11, 2020Updated 5 years ago
- Stealthy Fully Undetectable (FUD) RAT with 15 plugins: stealer, crypto stealer, keylogger, remote desktop and more more...☆26Sep 13, 2023Updated 2 years ago
- Control Panel and Builder (Working)☆10Apr 15, 2017Updated 8 years ago
- Simple legit cheat☆12May 16, 2021Updated 4 years ago
- Reverse Shell x86☆16Jan 6, 2019Updated 7 years ago
- Invoke-Decoder – A PowerShell script to decode/deobfuscate malware samples☆18Aug 2, 2020Updated 5 years ago