mstfknn / Stealers-CollectionLinks
☆10Updated 2 years ago
Alternatives and similar repositories for Stealers-Collection
Users that are interested in Stealers-Collection are comparing it to the libraries listed below
Sorting:
- Specific C2 Detection Tool Written To Detect C2 Servers From RisePro Stealer Malware.☆13Updated last year
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Updated 5 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆30Updated 6 years ago
- 🔅 Reverse shell written on python3☆14Updated 4 years ago
- Repository of tools used in my blog☆52Updated last year
- extensible exploitation framework shipped on a modular multi-tasking architecture☆78Updated 2 years ago
- ☆37Updated 3 years ago
- cross-platform C2 framework in python 2☆39Updated 3 years ago
- Ransomware Decryptors☆36Updated 3 years ago
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆11Updated 2 years ago
- The payload will search for specific files in desktop then upload them as *zip to your web server☆37Updated 6 years ago
- recover Firefox and more browsers logins☆48Updated 3 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- ☆22Updated 5 years ago
- CloudflaredRAT is a simple combination of popular open-source tools, wrapping a local-facing shell with Cloudflares Argo Tunnel in an exe…☆15Updated 4 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆51Updated 4 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆33Updated 6 years ago
- All docker botnets acrued since early 2018 .... as of 2025 there is a stall in actors...tbd if updates beyond JAN 2025 will continue.☆22Updated 8 months ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆28Updated 2 months ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆97Updated 4 years ago
- Tool to brute website sub-domains and dirs.☆47Updated 5 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 6 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) Remote Adminstration Tools.☆25Updated 4 years ago
- Webshell Jumping Edition☆29Updated 8 years ago
- Inject Macro and DDE code into Excel and Word documents (reverse shell)☆59Updated 3 years ago
- A Remote Access Tool using Google Apps Script as the proxy for command and control.☆113Updated 4 years ago
- A simple python reverse shell written just for fun.☆64Updated 2 years ago
- Simple class to search and upload files☆28Updated 6 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Updated 3 years ago