ADR is a trojan that retrieves all information on the computer and all data stored in applications using chormuim. It recovers cookies, tokens, passwords and saved bank cards. This malware is undetectable by Windows Defender, Chrome, Virustotal (4/71).
☆27Sep 5, 2023Updated 2 years ago
Alternatives and similar repositories for ADR
Users that are interested in ADR are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Remote Administration Tool☆13Jul 9, 2023Updated 2 years ago
- Really useful hacking tools.☆19Dec 16, 2023Updated 2 years ago
- Deobfuscator for : https://github.com/Blank-c/BlankOBF☆14Aug 21, 2023Updated 2 years ago
- Telegram-based PowerShell Runspace Host☆11Dec 8, 2022Updated 3 years ago
- This tool is for "educational" purpose only, and I am not responsible for any damage caused by it in any way!☆12May 2, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Launch a Windows EXE file with this EXE file (application filter evasion)☆15Mar 10, 2017Updated 9 years ago
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆13Jul 14, 2022Updated 3 years ago
- Apex RAT - Remote Administration Tool☆33Dec 2, 2023Updated 2 years ago
- C# API for Nidhogg rootkit☆21Apr 25, 2024Updated 2 years ago
- Plunge into the depths of the web with Linkscraper! Uncover links, images, emails, and more swiftly, catering to researchers, developers,…☆11Nov 9, 2024Updated last year
- The Web Controller☆10Dec 4, 2019Updated 6 years ago
- This is a plugin for the c# R.A.T server providing extension to android based phone systems☆20Mar 2, 2018Updated 8 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Oct 21, 2023Updated 2 years ago
- ☆11Jul 13, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- MappingInjection via csharp☆40Nov 19, 2021Updated 4 years ago
- A FUD Rust Dropper☆15Feb 4, 2023Updated 3 years ago
- NoSecerets is a python script that is designed to crack hashes extremely fast. Faster even than Hashcat☆11Mar 13, 2022Updated 4 years ago
- A free, completely open-source and powerful selfbot allowing you to fully reach the potential of Discord. Includes numerous commands desi…☆27Jul 19, 2023Updated 2 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆21Jul 9, 2022Updated 3 years ago
- Hack whatsapp web☆10Jul 1, 2018Updated 7 years ago
- CVE-2022-22947_POC_EXP☆13Mar 17, 2022Updated 4 years ago
- ☆20Jul 23, 2023Updated 2 years ago
- Cerberos Is A Tool Wich Has Over 50+ Functions. Cerberos Uses Discord as C2.☆17Jan 7, 2023Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- cross-platform C2 framework in python 2☆37May 19, 2022Updated 3 years ago
- Web shell generation tool written in go☆12Feb 28, 2023Updated 3 years ago
- Download a payload and make it run from registry without droppng.☆107Apr 9, 2019Updated 7 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆23Jun 15, 2020Updated 5 years ago
- A powerful Remote Administration Tool that uses Discord as C2. This means you can control your devices through Discord.☆60Jan 21, 2024Updated 2 years ago
- Bitcoin miner runs at the possible highest speed your pc can handle☆12Nov 1, 2022Updated 3 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- Locate device location using Social engineering☆18Sep 30, 2022Updated 3 years ago
- 简单版的PE加载器☆13Aug 11, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A software-defined GNSS receiver toolkit☆11Sep 20, 2022Updated 3 years ago
- Simple legit cheat☆12May 16, 2021Updated 4 years ago
- Stealthy Fully Undetectable (FUD) RAT with 15 plugins: stealer, crypto stealer, keylogger, remote desktop and more more...☆26Sep 13, 2023Updated 2 years ago
- Reverse Shell x86☆16Jan 6, 2019Updated 7 years ago
- Invoke-Decoder – A PowerShell script to decode/deobfuscate malware samples☆18Aug 2, 2020Updated 5 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆13Sep 6, 2019Updated 6 years ago
- Stealer chrome v81+, Firefox v75+, And more than 30 different programs and crypto-wallets☆11May 1, 2020Updated 6 years ago