x86byte / LummaC2-StealerLinks
LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis
☆81Updated 6 months ago
Alternatives and similar repositories for LummaC2-Stealer
Users that are interested in LummaC2-Stealer are comparing it to the libraries listed below
Sorting:
- A Free Open sourced crypter that builds a output .NET .exe Stub (Updated whenever I feel like it)☆19Updated 4 months ago
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆121Updated 4 months ago
- ☆128Updated 10 months ago
- Yandex browser passwords and credit-cards decryption algorithm☆20Updated 5 months ago
- Ransomware written in go, encrypt - decrypt.☆28Updated 4 months ago
- A PowerShell malware that disables all the Windows Security features with UAC Bypass and Anti-VM features. (Designed to work both as a po…☆40Updated 3 months ago
- ☆45Updated 11 months ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆51Updated 4 months ago
- This repository is a tool to create a .suo that when run by visual studio's will achieve code execution☆109Updated last year
- My POC implementation of HVNC (Hidden VNC / Hidden Desktop)☆27Updated 8 months ago
- The best powershell obfuscator ever made☆112Updated last month
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass AMSI scanning by redirecting AmsiScanBuf…☆57Updated 4 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆80Updated 4 months ago
- Shellcode Loader Library.☆10Updated 8 months ago
- Divulge Stealer a highly advanced info-stealer that outperforms its predecessor, Umbral-Stealer by Blank-c. This new iteration is a compl…☆13Updated 8 months ago
- A unique introduction to native runtime obfuscation.☆23Updated 6 months ago
- Decrypting yandex browser passwords☆25Updated 5 months ago
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆132Updated 3 months ago
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆120Updated 8 months ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆41Updated 4 months ago
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆42Updated 9 months ago
- NCrypt portable crypter is a collection of C++ build tools, a tiny C compiler for the stub, and a useful codebase for anyone wanting to c…☆11Updated last year
- Classic Process Injection with Memory Evasion Techniques implemantation☆71Updated last year
- Troll TaskManager, and play with it .☆26Updated last month
- Write-ups and proof of concepts of design and implementaion of various modern malwares.☆29Updated 2 years ago
- ☆41Updated last year
- Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠☆110Updated 2 weeks ago
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to ne…☆23Updated 4 months ago
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆25Updated 4 months ago
- (0day) Local Privilege Escalation in IObit Malware Fighter☆150Updated 5 months ago