☆16Mar 25, 2023Updated 2 years ago
Alternatives and similar repositories for Stealer
Users that are interested in Stealer are comparing it to the libraries listed below
Sorting:
- Play wordlists at encrypted Exodus wallets to recover wallet password☆12Jul 7, 2021Updated 4 years ago
- ☆22Jun 21, 2022Updated 3 years ago
- This is Growtopia stealer save.dat file, Discord Webhook sends a file, mac address, IP info, city, and more...☆34Aug 18, 2021Updated 4 years ago
- Golang packer that use process hollowing☆19May 1, 2022Updated 3 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Sep 4, 2021Updated 4 years ago
- SmartAgent Server☆26May 24, 2023Updated 2 years ago
- Applying some AV evasion techniques on a metasploit reverse shell☆18Nov 12, 2020Updated 5 years ago
- ☆13May 24, 2023Updated 2 years ago
- ☆16Jan 12, 2022Updated 4 years ago
- Polymorphic ELF Runtime Crypter written in rust.☆21Jan 21, 2021Updated 5 years ago
- DoublePulsar (Position-Independent) Shellcode (Windows 7 SP1 x64)☆28Mar 11, 2020Updated 5 years ago
- Ransomware hello kitty☆23Mar 18, 2021Updated 4 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆22Aug 6, 2022Updated 3 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆51Jun 18, 2022Updated 3 years ago
- WMI SA stuffs☆30Apr 18, 2022Updated 3 years ago
- A builder for BatchStealer☆17Aug 11, 2022Updated 3 years ago
- Without closing windows defender, to make defender useless by removing its token privileges and lowering the token integrity.☆31Mar 13, 2022Updated 3 years ago
- ☆11Apr 18, 2022Updated 3 years ago
- ☆13Nov 19, 2022Updated 3 years ago
- ssh user enumeration☆12Mar 21, 2023Updated 2 years ago
- Presets for FxSound equalizer software for boosting sound quality, volume, and bass☆11Nov 19, 2025Updated 3 months ago
- The malware is un-killable and fully undetectable by antivirus, developed by Kingsman. It steals the browser passwords, Discord Tokens & …☆61Jul 11, 2021Updated 4 years ago
- A little implant which SSH's back with a shell☆39Feb 1, 2022Updated 4 years ago
- CVE-2022-26134 - Confluence Pre-Auth RCE | OGNL injection☆31Jun 3, 2022Updated 3 years ago
- Fud Runpe Av Evasion / All Av Bypass☆32Feb 24, 2023Updated 3 years ago
- IAT-Obfuscation to make static analysis of executable harder.☆44Sep 6, 2021Updated 4 years ago
- Repository untuk kuliah rekayasa web ss 2021☆10Jul 14, 2021Updated 4 years ago
- Growtopia stealer written at C# that steal save.dat, mac address, IP information, etc...☆10Aug 17, 2021Updated 4 years ago
- Tool to start a python http server in a simple way☆10Mar 30, 2022Updated 3 years ago
- Python 3 scripts to disassemble and reassemble BGI 1.69 [Eustia] Buriko (both extension-less and _bp) scripts by kingshriek☆14Apr 6, 2016Updated 9 years ago
- Platform independent editor to backup, restore and modify the EEPROM for KD8CEC users☆13Jul 26, 2025Updated 7 months ago
- Provide high quality solutions to the exercises in "The C Programming Language" by Kernighan and Ritchie (2nd edition), also referred to …☆11Jan 29, 2020Updated 6 years ago
- Secp256k1 blind signature certification authority boilerplate☆11Apr 23, 2024Updated last year
- ☆12Apr 28, 2025Updated 10 months ago
- RemClip is a C# project which permits to steal user clipboard data and send it to a remote web server under attacker control☆15Sep 2, 2024Updated last year
- 0day-today-archive: Historical collection of exploits and vulnerabilities from 0day.today☆34Sep 22, 2025Updated 5 months ago
- ☆11Aug 11, 2020Updated 5 years ago
- RDPCloud - RDP Control Panel☆10Apr 16, 2025Updated 10 months ago
- DECA Altera Max 10 FPGA Labs☆12Jan 8, 2016Updated 10 years ago