mstfknn / Stealers-CollectionLinks
☆10Updated 2 years ago
Alternatives and similar repositories for Stealers-Collection
Users that are interested in Stealers-Collection are comparing it to the libraries listed below
Sorting:
- Specific C2 Detection Tool Written To Detect C2 Servers From RisePro Stealer Malware.☆13Updated 2 years ago
- Ransomware Decryptors☆36Updated 3 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆30Updated 6 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Updated 6 years ago
- ☆37Updated 3 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆38Updated 2 months ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆28Updated last week
- Bypass Windows Defender with py2exe from memory.☆38Updated 3 years ago
- All docker botnets acrued since early 2018 .... as of 2025 there is a stall in actors...tbd if updates beyond JAN 2025 will continue.☆22Updated 10 months ago
- Shock the shell! Exploit many injection method for shellshock☆18Updated 7 years ago
- python hash cracker☆52Updated last year
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆48Updated last year
- CloudflaredRAT is a simple combination of popular open-source tools, wrapping a local-facing shell with Cloudflares Argo Tunnel in an exe…☆14Updated 5 years ago
- 🔅 Reverse shell written on python3☆14Updated 4 years ago
- recover Firefox and more browsers logins☆48Updated 4 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆51Updated 2 years ago
- Phoenix based exploit kit for educational purpose.☆17Updated 6 years ago
- Inject Macro and DDE code into Excel and Word documents (reverse shell)☆60Updated 4 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 6 years ago
- ☆25Updated 3 years ago
- A collaborative, multi-platform, red teaming framework☆14Updated 5 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 5 years ago
- Malware campaigns and APTs research by BlackArrow☆19Updated 5 years ago
- Method of finding interesting domains using keywords + JARMs☆13Updated 2 years ago
- ☆53Updated 4 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆95Updated 4 years ago
- Repository of tools used in my blog☆52Updated last year
- ☆50Updated 5 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆51Updated 4 years ago
- Webshell Jumping Edition☆29Updated 8 years ago