Windows stealer written in Rust, focused on minimal dependencies and maximum efficiency. It uses mostly direct Windows API calls, avoiding heavy external libraries to keep the binary lightweight, fast, and easier to maintain.
☆73Oct 10, 2025Updated 6 months ago
Alternatives and similar repositories for ShadowSniff
Users that are interested in ShadowSniff are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The first open source runtime windows batch and command line deobfuscator☆42Aug 20, 2025Updated 8 months ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 4 years ago
- A Windows information stealer / credential stealer written in Go for security research and malware analysis. Demonstrates browser passwo…☆39Dec 15, 2025Updated 4 months ago
- Hono(RPC) x Next.js (App Router) x RadixUI x Shadcn UI x TailwindCSS x Gsap x Three.js☆14Feb 9, 2024Updated 2 years ago
- maldev obviously☆28May 5, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Lost Crypto wallet searcher | Generates addresses from mnemonic and checks it☆12Apr 23, 2025Updated last year
- [WIP] A Modern Rust Remote Administration Tool for Windows.☆64Nov 7, 2025Updated 6 months ago
- Zerokit shared code☆17Mar 28, 2019Updated 7 years ago
- extract chromium-based browser's cookies using chrome's remote debugging without admin rights☆23Nov 3, 2024Updated last year
- Next-Gen Stealer written in Go. Stealing from Discord, Chromium-Based & Firefox-Based Browsers, Crypto Wallets and more, from every user…☆441Dec 11, 2024Updated last year
- A Free Open sourced crypter that builds a output .NET .exe Stub (Updated whenever I feel like it)☆21Oct 18, 2025Updated 6 months ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 4 years ago
- ☆18Sep 12, 2025Updated 7 months ago
- Execute an arbitrary command within the context of another process☆20Jun 28, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- One-header configurable C++20 COFF loader☆20Jul 21, 2025Updated 9 months ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 6 years ago
- ☆95Nov 16, 2025Updated 5 months ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆32Sep 15, 2025Updated 7 months ago
- PandaCrypter is a C#-based tool designed to convert PowerShell scripts into obfuscated batch files (.bat) with encryption and additional …☆49Aug 16, 2025Updated 8 months ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆86Oct 20, 2025Updated 6 months ago
- Generate DLL proxy/sideload projects. Automatically parses PE export tables and generates ready-to-compile project for red team engagemen…☆145Mar 8, 2026Updated 2 months ago
- Debugger checks in 3 ways☆19Jan 25, 2018Updated 8 years ago
- Shellcode execution via x86 inline assembly based on MSVC syntax☆17Apr 26, 2023Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆13Sep 6, 2019Updated 6 years ago
- Red Team C2 and Post Exploitation code☆36Mar 10, 2026Updated last month
- Source Code Management Attack Toolkit☆13Aug 1, 2022Updated 3 years ago
- Latest UserAgents Dumped Various Devices / Platforms☆19Apr 25, 2026Updated last week
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible i…☆65Apr 2, 2025Updated last year
- AdminX it's a Malware to execute process as some users from a Windows OS☆10May 4, 2023Updated 3 years ago
- The best powershell obfuscator ever made☆132Aug 1, 2025Updated 9 months ago
- Мутация PE x86☆16Jun 2, 2019Updated 6 years ago
- C++ keylogger to save all the keys pressed into a local txt file☆10Apr 6, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Erebus is a payload generator written in Nim.☆17Jun 13, 2023Updated 2 years ago
- PE(compressed dll) memory loader using nt api☆46Jul 3, 2017Updated 8 years ago
- Amassing wealth in the form of biochemical tactical nuclear hack precision strike notes for existential fulfillment and destruction of th…☆13Feb 19, 2022Updated 4 years ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆134Apr 18, 2026Updated 2 weeks ago
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- Experiments in weaponizing Crystal for offensive operations.☆29Mar 23, 2023Updated 3 years ago
- Chrome COOKIE v20 decryption PoC☆248Mar 19, 2026Updated last month