Information stealer logs parser
☆96Aug 2, 2024Updated last year
Alternatives and similar repositories for stealer-parser
Users that are interested in stealer-parser are comparing it to the libraries listed below
Sorting:
- Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber …☆105Jul 31, 2023Updated 2 years ago
- Tool to parse Stealer Logs.☆20Aug 2, 2023Updated 2 years ago
- good looking dashboard to query your infostealer logs☆23Jan 16, 2026Updated last month
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆31May 23, 2025Updated 9 months ago
- ☆20Nov 5, 2025Updated 4 months ago
- ☆25Aug 11, 2020Updated 5 years ago
- a BOF implementation of various registry persistence methods☆94Nov 11, 2025Updated 3 months ago
- Multilayered secret detection tool☆41Feb 11, 2026Updated 3 weeks ago
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆28Jul 21, 2025Updated 7 months ago
- The Web UI for Antnium☆27Jun 14, 2022Updated 3 years ago
- The command prompt has been disabled by your administrator☆42May 18, 2023Updated 2 years ago
- Try harder to bypass that WAF...☆13Jan 4, 2015Updated 11 years ago
- API for Asset Service☆15Aug 15, 2024Updated last year
- ☆13Aug 13, 2024Updated last year
- ShadowDropper is a utility for covertly delivering and executing payloads on a target system.☆27Jul 4, 2025Updated 8 months ago
- ☆27Mar 2, 2022Updated 4 years ago
- Published Articles of the Past (trying to be as complete as possible)☆15Jan 20, 2021Updated 5 years ago
- ☆18Sep 24, 2024Updated last year
- Jailbreak detection bypass for the iOSSecuritySuite Swift library☆17Feb 18, 2024Updated 2 years ago
- Camille's scraping boilerplate☆13Nov 1, 2022Updated 3 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- ☆40Apr 23, 2025Updated 10 months ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆129Oct 4, 2024Updated last year
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆92Aug 3, 2025Updated 7 months ago
- Threadless Process Injection through entry point hijacking☆350Sep 10, 2024Updated last year
- A lightweight Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).☆68Dec 17, 2025Updated 2 months ago
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 9 months ago
- Flag submission system for Attack/Defense CTFs☆13Jul 5, 2021Updated 4 years ago
- JXA script for Mythic that prints the TCC.db☆15Apr 18, 2021Updated 4 years ago
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆124Jan 17, 2026Updated last month
- Stealthily inject shellcode into an executable☆452Oct 19, 2025Updated 4 months ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs☆337Feb 27, 2026Updated last week
- Driver Reverse & Exploitation☆82Sep 4, 2025Updated 6 months ago
- A keygen for Specter Insight C2☆45Feb 17, 2025Updated last year
- basic proxy as an azure function serverless app☆17Jan 12, 2023Updated 3 years ago
- Powershell Linter☆89Updated this week
- inviteflood : SIP/SDP INVITE message flooding over UDP/IP☆12Sep 20, 2015Updated 10 years ago