A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.
☆23Jun 15, 2020Updated 5 years ago
Alternatives and similar repositories for orphicMETA
Users that are interested in orphicMETA are comparing it to the libraries listed below
Sorting:
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- Source code of Claw Key logger previously sold on HackForums☆55Aug 6, 2022Updated 3 years ago
- Control Panel and Builder (Working)☆10Apr 15, 2017Updated 8 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆94May 15, 2021Updated 4 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆19Sep 12, 2019Updated 6 years ago
- DarkRat source - beware untested source and resources.☆21Dec 7, 2019Updated 6 years ago
- DarkC0ders net is a open source botnet which is programmed in C#, using the .NET 2.0 Framework.☆10Dec 1, 2019Updated 6 years ago
- Saurik remote control software opensource, X30 is now available.☆37Oct 17, 2022Updated 3 years ago
- Execute an arbitrary command within the context of another process☆21Jun 28, 2019Updated 6 years ago
- A TCP-Client connected Keylogger in C#☆12Mar 14, 2017Updated 9 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- A project to learn about malware and c++ coding☆23Sep 5, 2015Updated 10 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Aug 1, 2021Updated 4 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18May 16, 2018Updated 7 years ago
- Simple windows backdoor command shell.☆20Dec 4, 2017Updated 8 years ago
- A remote administration tool for Windows, written in C#☆36Mar 15, 2021Updated 5 years ago
- Program for remote computer management with Telegram on native C++ - by B4DB4B3☆116May 30, 2021Updated 4 years ago
- DarkRats Standalone HVNC☆25May 20, 2022Updated 3 years ago
- An open-source, centralized HTTPS botnet☆79Apr 11, 2023Updated 2 years ago
- Applying some AV evasion techniques on a metasploit reverse shell☆18Nov 12, 2020Updated 5 years ago
- steal cookie for chrome and mozilla firefox, use another extension to login with the cookie stealed☆33Mar 25, 2021Updated 4 years ago
- Bind shell that uses Named Pipes as transport and execute PowerShell code through Runspaces.☆17Sep 13, 2019Updated 6 years ago
- PHP + C++ save.dat stealer.☆12Sep 13, 2020Updated 5 years ago
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆32Aug 7, 2019Updated 6 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Sep 6, 2019Updated 6 years ago
- 🚀 Builder of Malware Loader☆13Nov 12, 2020Updated 5 years ago
- PHP WebShell Backdoor for Access all dir/file in the Website.☆14Jul 29, 2021Updated 4 years ago
- Example Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic leve…☆70May 9, 2019Updated 6 years ago
- keylogger extension chrome, get cookie, redirection to fake web site or a nother website☆16Sep 21, 2020Updated 5 years ago
- NetScan is a Network Reconnaissance Tool for Windows/Linux/OSx etc Written in Python 3.☆22Jan 10, 2021Updated 5 years ago
- Dll injector POC for new handle stealing technique☆21Oct 8, 2017Updated 8 years ago
- A Windows native DLL injection library written in C# that supports several methods of injection.☆13Dec 17, 2018Updated 7 years ago
- Botnet SDK Based on Zeus HTTP Malware (Educational Purposes)☆18Sep 7, 2019Updated 6 years ago
- Monitor Files and Folders for Changes in Real Time .☆11Jan 10, 2019Updated 7 years ago
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆14Aug 31, 2017Updated 8 years ago
- Remote Administration Tool, Server Written in C# and Client Written in C++☆15Dec 8, 2022Updated 3 years ago
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- Mini Wordress Exploiter using CVE2020☆30Dec 25, 2020Updated 5 years ago