turalalv / Stealer
β14Updated last year
Alternatives and similar repositories for Stealer:
Users that are interested in Stealer are comparing it to the libraries listed below
- Bruteforce tool for Pentester's lucky day targeting SSH-services.β13Updated 4 years ago
- Source Code for BlueEagle jRAT & Release β πβ£βBlue Eagle jRAT is a cross platform RAT tool (java RAT) / (jRAT) which is { [Windows RAT]β¦β1Updated 2 years ago
- Stealer of sessions of the Telegram Desktop application on windows 7, 8 and 10 πβ9Updated 4 years ago
- XDNR is a X0R Cryptor along with DEC/N0T/R0R encoder plus random byte insertion encoder, that generates null free encrypted and encoded sβ¦β16Updated 2 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps β¦β24Updated 2 years ago
- π§ C# UAC Bypass technique using mock directories π§β29Updated 2 years ago
- π Reverse shell written on python3β14Updated 4 years ago
- Zombie Content management systems exploitation Bot Sourceβ10Updated 3 years ago
- POC for scanning ProxyShell(CVE-2021-34523,CVE-2021-34473,CVE-2021-31207)β17Updated 3 years ago
- JALSI - Just Another Lame Shellcode Injectorβ30Updated 3 years ago
- β15Updated 3 years ago
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccessβ9Updated 3 years ago
- Very Easy Relative Backdoor Applicationβ12Updated 3 years ago
- Disable Windows Defender All Versionβ31Updated 4 years ago
- Bypass Windows Defender with py2exe from memory.β36Updated 3 years ago
- A program to steal user information through a simple linkβ13Updated last year
- β23Updated 5 years ago
- DarkRats Standalone HVNCβ24Updated 2 years ago
- All Our Productsβ12Updated 4 years ago
- Making Shellcode fully undetectable using uuidβ23Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagemeβ¦β19Updated 2 years ago
- Python script to exploit CVE-2022-22954 and then exploit CVE-2022-22960β2Updated 2 years ago
- A Build Your Own Botnet Project Build For People Who Wanna Hijack Peoples Computers And Control Them With Over 300 Features!β11Updated 5 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.β21Updated 3 years ago
- Personnel scripts,projects notes,hacks,random thoughts,mindmap etc....β31Updated 2 weeks ago
- Utilizing Alternative Shellcode Execution Via Callbacksβ13Updated last year
- Red Team C2 and Post Exploitation Codeβ36Updated this week
- A malicious .cab creation tool for CVE-2021-40444β12Updated 3 years ago
- Inject Metasploit Shell Code in Legitimate Processβ11Updated 4 years ago
- RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocolβ31Updated 3 years ago