Windows stealer written in Rust, focused on minimal dependencies and maximum efficiency. It uses mostly direct Windows API calls, avoiding heavy external libraries to keep the binary lightweight, fast, and easier to maintain.
☆68Oct 10, 2025Updated 5 months ago
Alternatives and similar repositories for ShadowSniff
Users that are interested in ShadowSniff are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The first open source runtime windows batch and command line deobfuscator☆43Aug 20, 2025Updated 7 months ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- A Windows information stealer / credential stealer written in Go for security research and malware analysis. Demonstrates browser passwo…☆31Dec 15, 2025Updated 3 months ago
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccess☆10Aug 1, 2021Updated 4 years ago
- Hono(RPC) x Next.js (App Router) x RadixUI x Shadcn UI x TailwindCSS x Gsap x Three.js☆14Feb 9, 2024Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Simple little rootkit made in C☆13Feb 15, 2021Updated 5 years ago
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass ETW scanning by redirecting ETW calls to…☆45Jun 1, 2025Updated 9 months ago
- maldev obviously☆28May 5, 2025Updated 10 months ago
- Lost Crypto wallet searcher | Generates addresses from mnemonic and checks it☆11Apr 23, 2025Updated 11 months ago
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆19May 8, 2025Updated 10 months ago
- Advanced kernel-native security framework to disrupt and prevent DNS-based breaches including C2 channels and tunneling with zero data lo…☆32Aug 30, 2025Updated 6 months ago
- Anti Virtulization, Anti Debugging, AntiVM, Anti Virtual Machine, Anti Debug, Anti Sandboxie, Anti Sandbox, VM Detect package.☆79Apr 27, 2025Updated 11 months ago
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆139Apr 27, 2025Updated 11 months ago
- [WIP] A Modern Rust Remote Administration Tool for Windows.☆61Nov 7, 2025Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Troll TaskManager, and play with it .☆30Aug 3, 2025Updated 7 months ago
- Zerokit shared code☆17Mar 28, 2019Updated 6 years ago
- A WIP shellcode loader tool which bypasses AV/EDR, coded in C++, and equipped with a minimal builder.☆86Sep 27, 2025Updated 6 months ago
- ⚠️ Malware Development training ⚠️☆40Feb 24, 2025Updated last year
- Ransomware written in go, encrypt - decrypt.☆30Apr 27, 2025Updated 11 months ago
- extract chromium-based browser's cookies using chrome's remote debugging without admin rights☆22Nov 3, 2024Updated last year
- Next-Gen Stealer written in Go. Stealing from Discord, Chromium-Based & Firefox-Based Browsers, Crypto Wallets and more, from every user…☆432Dec 11, 2024Updated last year
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- A Free Open sourced crypter that builds a output .NET .exe Stub (Updated whenever I feel like it)☆19Oct 18, 2025Updated 5 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆18Sep 12, 2025Updated 6 months ago
- Generate DLL proxy/sideload projects. Automatically parses PE export tables and generates ready-to-compile project for red team engagemen…☆132Mar 8, 2026Updated 2 weeks ago
- ☆10Dec 25, 2023Updated 2 years ago
- Execute an arbitrary command within the context of another process☆21Jun 28, 2019Updated 6 years ago
- ☆90Nov 16, 2025Updated 4 months ago
- One-header configurable C++20 COFF loader☆21Jul 21, 2025Updated 8 months ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆55May 12, 2025Updated 10 months ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆33Sep 15, 2025Updated 6 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆86Oct 20, 2025Updated 5 months ago
- Debugger checks in 3 ways☆19Jan 25, 2018Updated 8 years ago
- Shellcode execution via x86 inline assembly based on MSVC syntax☆17Apr 26, 2023Updated 2 years ago
- Windows Encrypt/Decrypt using AES 256 bit keys☆13Dec 25, 2020Updated 5 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Sep 6, 2019Updated 6 years ago
- Red Team C2 and Post Exploitation code☆36Mar 10, 2026Updated 2 weeks ago
- Source Code Management Attack Toolkit☆13Aug 1, 2022Updated 3 years ago