mstfknn / Stealers-CollectionLinks
☆9Updated 2 years ago
Alternatives and similar repositories for Stealers-Collection
Users that are interested in Stealers-Collection are comparing it to the libraries listed below
Sorting:
- Specific C2 Detection Tool Written To Detect C2 Servers From RisePro Stealer Malware.☆11Updated last year
- fully Undetectable payload generator for metasploit☆11Updated 2 years ago
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆12Updated 2 years ago
- ☆37Updated 3 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆30Updated 6 years ago
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- 🔅 Reverse shell written on python3☆15Updated 4 years ago
- PhishLog is a penetration testing and red teaming tool that automates the setup of a live keylogger that could be used with phishing camp…☆30Updated 6 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆30Updated last year
- cross-platform C2 framework in python 2☆41Updated 3 years ago
- The project aims at building a Scan-Time Crypter that can assist a malware in bypassing antivirus software. The Crypter will open the mal…☆16Updated 4 years ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆15Updated last year
- Fud Persistent Windows Backdoor developed purely in python☆29Updated 4 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- CloudflaredRAT is a simple combination of popular open-source tools, wrapping a local-facing shell with Cloudflares Argo Tunnel in an exe…☆14Updated 4 years ago
- Create a malicious pip package (PoC)☆12Updated last year
- Disable Windows Defender All Version☆31Updated 4 years ago
- Helps To Bypass Av Sometimes☆17Updated 4 years ago
- Inject Macro and DDE code into Excel and Word documents (reverse shell)☆57Updated 3 years ago
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆25Updated 2 months ago
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Updated 2 years ago
- Script to setup a phishing server on the cloud☆12Updated 4 years ago
- IP addresses exploiting recent log4j2 vulnerability CVE-2021-44228☆16Updated 3 years ago
- A builder for BatchStealer☆22Updated 2 years ago
- Source Code for BlueEagle jRAT & Release ☄ 📏☣✒Blue Eagle jRAT is a cross platform RAT tool (java RAT) / (jRAT) which is { [Windows RAT]…☆1Updated 2 years ago
- Scrape Pastebin API to collect daily pastes, setup a wordlist and be alerted by email when you have a match.☆49Updated 4 months ago
- HTTPBotNet☆21Updated 3 months ago
- Fully undetectable bypass for every antivirus (FUD at the moment). Works by downloading a bat file that adds an exclusion for exe files, …☆36Updated 2 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆24Updated 3 years ago