turalalv / Stealer
โ13Updated last year
Alternatives and similar repositories for Stealer:
Users that are interested in Stealer are comparing it to the libraries listed below
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps โฆโ24Updated 2 years ago
- ๐ง C# UAC Bypass technique using mock directories ๐งโ29Updated 2 years ago
- POC for scanning ProxyShell(CVE-2021-34523,CVE-2021-34473,CVE-2021-31207)โ17Updated 3 years ago
- โ14Updated 3 years ago
- UAdmin Phishlets for common sitesโ13Updated 2 years ago
- Zombie Content management systems exploitation Bot Sourceโ10Updated 2 years ago
- Stealer of sessions of the Telegram Desktop application on windows 7, 8 and 10 ๐โ9Updated 4 years ago
- Bruteforce tool for Pentester's lucky day targeting SSH-services.โ13Updated 4 years ago
- Source Code for BlueEagle jRAT & Release โ ๐โฃโBlue Eagle jRAT is a cross platform RAT tool (java RAT) / (jRAT) which is { [Windows RAT]โฆโ1Updated 2 years ago
- Bypass Windows Defender with py2exe from memory.โ36Updated 2 years ago
- ๐ Python Exploit for CVE-2022-23935โ13Updated last year
- 51Pwn Platform๏ผไธบ้ปๅฎข่็็ๅคงๆฐๆฎๆ็ดขๅผๆ๏ผBig data search engine born for hackersโ29Updated 3 months ago
- MyBB 1.8.32 - Chained LFI Remote Code Execution (RCE) (Authenticated) python exploit script...โ15Updated last year
- โ16Updated 5 years ago
- ๐ Reverse shell written on python3โ15Updated 4 years ago
- Windows shellcode encoding and encrypting toolโ21Updated 2 years ago
- HTTPBotNetโ21Updated 3 months ago
- HTTP based framework for building command and control components for remote access trojansโ12Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagemeโฆโ19Updated 2 years ago
- A Golang implant that uses Discord as a C2 team serverโ65Updated 2 months ago
- A malicious .cab creation tool for CVE-2021-40444โ12Updated 3 years ago
- โ23Updated 5 years ago
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccessโ9Updated 3 years ago
- Payload Dropper with Persistance & Privesc & UAC bypass ๐ฑโ๐คโ13Updated 9 months ago
- Conquer the deep ocean, host an .onion site fast!โ15Updated 2 years ago
- 1/ An0nymousF0x-V4 2/ DorkBull 3/ JEX_V5 4/ JaguarV3 5/ Mass Bing Grab sites 6/ NekoBot 7/ PayloadV3 8/ Raiz0w0rm 9/ Vipeโฆโ40Updated 2 years ago
- Crypter/Stub/Downloader for payloads and malware, bypassing all AV and achiving a score of 0/60 detections on virus totalโ9Updated 9 months ago
- Disable Windows Defender All Versionโ31Updated 4 years ago
- exploitpack extracted from a honeynet which is being prepared by intruduers to be used as an exploitation infrastructureโ14Updated 2 years ago
- Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OSโ44Updated last year