☆16Mar 25, 2023Updated 3 years ago
Alternatives and similar repositories for Stealer
Users that are interested in Stealer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆51Jun 18, 2022Updated 3 years ago
- Play wordlists at encrypted Exodus wallets to recover wallet password☆12Jul 7, 2021Updated 4 years ago
- 🚀 Blazing fast and Powerful Stealer, no popo made with python☆25Nov 2, 2024Updated last year
- ☆22Jun 21, 2022Updated 3 years ago
- MacOS Stealer written in Rust. For Legal and Ethical Research Purposes Only.☆25Jan 3, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Self-updatable RAT + C2 server + client.☆16Jun 24, 2024Updated last year
- A local LKM rootkit loader/dropper that lists available security mechanisms☆53Sep 4, 2021Updated 4 years ago
- This is Growtopia stealer save.dat file, Discord Webhook sends a file, mac address, IP info, city, and more...☆34Aug 18, 2021Updated 4 years ago
- Golang packer that use process hollowing☆19May 1, 2022Updated 4 years ago
- Eclipse is a python stealer targeting windows operating system's, based on asynchronous module, with advanced features !☆13Nov 26, 2024Updated last year
- Multi Logger - Logs system information, Discord Token, IP/MAC Adress and more!☆10Aug 24, 2020Updated 5 years ago
- Applying some AV evasion techniques on a metasploit reverse shell☆18Nov 12, 2020Updated 5 years ago
- Automatically converts your firefox browser into a hacking tool by installing required plugins.☆12Jun 26, 2017Updated 8 years ago
- This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script…☆16Sep 8, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Remote Access Trojan for rust lang ( botnet )☆20Oct 18, 2023Updated 2 years ago
- DONT READ ME☆13Apr 21, 2025Updated last year
- Ransomware hello kitty☆23Mar 18, 2021Updated 5 years ago
- ☆23Jul 3, 2020Updated 5 years ago
- CLIPBRDWNDCLASS process injection technique(BOF) - execute beacon shellcode in callback☆67Sep 15, 2022Updated 3 years ago
- A repository of LIVE malwares for your own joy and pleasure☆16Apr 21, 2016Updated 10 years ago
- ☆10Oct 10, 2019Updated 6 years ago
- Leaked Mirai Source Code for Research/IoC Development Purposes☆16Oct 31, 2016Updated 9 years ago
- DoublePulsar (Position-Independent) Shellcode (Windows 7 SP1 x64)☆28Mar 11, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- PHP library for reading and writing SPSS or PSPP files☆11Nov 6, 2024Updated last year
- Online DC and AC electric circuits simulator / Онлайн-симулятор линейных электрических цепей постоянного и синусоидального тока☆22Dec 6, 2019Updated 6 years ago
- Generate primary obfuscated or secondary obfuscated CVE-2021-44228 or CVE-2021-45046 payloads to evade WAF detection.☆26May 26, 2022Updated 3 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆22Aug 6, 2022Updated 3 years ago
- SmartAgent Server☆26May 24, 2023Updated 2 years ago
- Tool to start a python http server in a simple way☆10Mar 30, 2022Updated 4 years ago
- Next-Gen Stealer written in Go. Stealing from Chromium-Based & Firefox-Based Browsers, Crypto Wallets and more, from every user on every …☆25Dec 12, 2025Updated 4 months ago
- Convert a GIF image into a sprite sheet to be used on an OLED Display with CircuitPython.☆14Feb 16, 2024Updated 2 years ago
- A little implant which SSH's back with a shell☆39Feb 1, 2022Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- IP camera bruteforcer, 32 bit version☆14Mar 24, 2016Updated 10 years ago
- A simple Go script to brute force or parse a password-protected PKCS#12 (PFX/P12) file.☆45Dec 31, 2020Updated 5 years ago
- ☆12Feb 18, 2022Updated 4 years ago
- ☆13Dec 27, 2014Updated 11 years ago
- Decentralised P2P botnet using toxcore.☆182Feb 8, 2026Updated 2 months ago
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- Growtopia stealer written at C# that steal save.dat, mac address, IP information, etc...☆10Aug 17, 2021Updated 4 years ago