x86byte / LummaC2-Stealer
LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis
☆40Updated 2 months ago
Alternatives and similar repositories for LummaC2-Stealer
Users that are interested in LummaC2-Stealer are comparing it to the libraries listed below
Sorting:
- LNK-Dropper Builder☆22Updated last month
- Ransomware written in go, encrypt - decrypt.☆20Updated 2 weeks ago
- ☆33Updated 7 months ago
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆24Updated 3 weeks ago
- How to bypass AMSI (Antimalware Scan Interface) in PowerShell/C++ by dynamically patching the AmsiScanBuffer function.☆17Updated 3 weeks ago
- Divulge Stealer a highly advanced info-stealer that outperforms its predecessor, Umbral-Stealer by Blank-c. This new iteration is a compl…☆11Updated 4 months ago
- Tool to retrieve Config from Redline C2 servers☆16Updated 2 years ago
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆28Updated 2 years ago
- PowerShell script to generate ShellCode in various formats☆41Updated 7 months ago
- some leaked src code for known and unknown malwares☆21Updated last month
- My POC implementation of HVNC (Hidden VNC / Hidden Desktop)☆23Updated 4 months ago
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆41Updated last year
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆44Updated 2 weeks ago
- Unhook Ntdll.dll, Go & C++.☆22Updated 3 weeks ago
- The best powershell obfuscator ever made☆106Updated 3 weeks ago
- 「⚔️」Ring 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.x☆23Updated last month
- ☆24Updated 6 months ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆109Updated last year
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆12Updated 3 weeks ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆63Updated 2 weeks ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆30Updated 2 weeks ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- A Free Open sourced crypter that builds a output .NET .exe Stub (Updated whenever I feel like it)☆14Updated 2 weeks ago
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆105Updated 2 weeks ago
- ☆55Updated 6 months ago
- Decrypting yandex browser passwords☆19Updated last month
- Make an Linux Kernel rootkit visible again.☆51Updated 2 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆52Updated 8 months ago
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆13Updated last year
- Stealer in c++.☆38Updated 2 weeks ago