Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber security students and professionals.
☆107Jul 31, 2023Updated 2 years ago
Alternatives and similar repositories for universal_stealer_log_parser
Users that are interested in universal_stealer_log_parser are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Information stealer logs parser☆101Aug 2, 2024Updated last year
- Diamond Sorter is a AIO - Stealer Log Utility for checking, sorting, and cleaning Combolists, Stealer Log Cookies, Autofill Text data and…☆62Apr 10, 2024Updated 2 years ago
- A WordPress rest-enumeration script☆10Mar 16, 2026Updated last month
- Specific C2 Detection Tool Written To Detect C2 Servers From RisePro Stealer Malware.☆13Nov 10, 2023Updated 2 years ago
- ☆14Sep 22, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- CVE-2023-28121 - WooCommerce Payments < 5.6.2 - Unauthenticated Privilege Escalation [ Mass Add Admin User ]☆12Jul 14, 2023Updated 2 years ago
- NOSNEX - Remake of fluxion for nethunter support☆10Jan 27, 2021Updated 5 years ago
- A tool to check the correctness of email and password☆21Feb 26, 2024Updated 2 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Dec 27, 2023Updated 2 years ago
- Repository for archiving Cobalt Strike configuration☆35Updated this week
- Search breached data on private nodes, darkweb, internet, end-to-end channels☆141Nov 27, 2019Updated 6 years ago
- bot to grab live credit cards from chknet irc☆60Apr 22, 2020Updated 6 years ago
- ZeroShell Manager (GUI) is a Tool designed to help users manage their Webshells☆22Sep 28, 2024Updated last year
- Writeup of what I'm learning with PentesterLab's Bootcamp☆10May 13, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A New Exploitation Technique for Visual Studio Projects☆13Nov 5, 2023Updated 2 years ago
- Socks5 & Socks4 & HTTPS IP:PORT proxy list are updated occasionally. Proxy list source links & API links☆13Apr 7, 2025Updated last year
- ☆34Apr 29, 2026Updated last week
- ☆13Feb 4, 2025Updated last year
- ☆13May 24, 2023Updated 2 years ago
- A repository of credential stealer formats☆253Jun 10, 2025Updated 10 months ago
- ☆150Mar 26, 2024Updated 2 years ago
- Beelzebub all in one Hacking Tools, Shell finder, Zone-H Grabber, ReverseIP, SMTP Finder, XMLRPC BF and more☆45May 27, 2025Updated 11 months ago
- TeleTracker is a simple set of Python scripts designed for anyone investigating Telegram channels. It helps you send messages quickly and…☆527Jun 15, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Tool to automate corporate network segmentation test☆21Aug 6, 2020Updated 5 years ago
- Google Dork Scanner for Google Chrome Extension☆17May 10, 2025Updated 11 months ago
- Custom rules by cyclone☆16Dec 12, 2025Updated 4 months ago
- Scanner for the SharePoint CVE-2025-53770 RCE zero day vulnerability.☆46Feb 10, 2026Updated 2 months ago
- This is a Python script that generates a staged payload that fully bypasses MS Defender. Can potentially be used for EDRs with some custo…☆77Mar 31, 2026Updated last month
- An academic Cyber Range☆22Updated this week
- Proxyless Mega.nz Account Checker☆24Dec 18, 2025Updated 4 months ago
- Unauthenticated RCE on cups-browsed (exploit and nuclei template)☆18Oct 3, 2024Updated last year
- Example for implementing a loading screen for flask.☆18Feb 15, 2021Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Open-source Fabric templates for cybersecurity and compliance☆32Jan 13, 2025Updated last year
- Ransomware groups posts☆44Updated this week
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆15Jan 9, 2019Updated 7 years ago
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆97Aug 23, 2025Updated 8 months ago
- Unauthenticated Command Injection In Progress Kemp LoadMaster☆19Aug 26, 2025Updated 8 months ago
- Cybercrime forums for Cyber Threat Intelligence purpose☆93Sep 25, 2019Updated 6 years ago
- Collection of windows rootkits☆29Jun 4, 2020Updated 5 years ago