x86byte / LummaC2-StealerLinks
LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis
☆89Updated 8 months ago
Alternatives and similar repositories for LummaC2-Stealer
Users that are interested in LummaC2-Stealer are comparing it to the libraries listed below
Sorting:
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆124Updated 6 months ago
- ☆129Updated last year
- Yandex browser passwords and credit-cards decryption algorithm☆20Updated 6 months ago
- A Free Open sourced crypter that builds a output .NET .exe Stub (Updated whenever I feel like it)☆20Updated last week
- Ransomware written in go, encrypt - decrypt.☆29Updated 6 months ago
- ☆49Updated last year
- A PowerShell malware that disables all the Windows Security features with UAC Bypass and Anti-VM features. (Designed to work both as a po…☆41Updated 5 months ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆53Updated 6 months ago
- This repository is a tool to create a .suo that when run by visual studio's will achieve code execution☆108Updated last year
- My POC implementation of HVNC (Hidden VNC / Hidden Desktop)☆26Updated 9 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆85Updated 6 months ago
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆26Updated 6 months ago
- NCrypt portable crypter is a collection of C++ build tools, a tiny C compiler for the stub, and a useful codebase for anyone wanting to c…☆17Updated last year
- A runtime Crypter written in C++ to bypass AVs signature based detection☆37Updated 2 years ago
- The best powershell obfuscator ever made☆112Updated 2 months ago
- Multi-component Remote Access Trojan: C++ client (victim), C# server, and Angular frontend.☆35Updated 5 months ago
- Anti Virtulization, Anti Debugging, AntiVM, Anti Virtual Machine, Anti Debug, Anti Sandboxie, Anti Sandbox, VM Detect package.☆69Updated 6 months ago
- Введение в разработку вредоносных программ☆10Updated 2 years ago
- A unique introduction to native runtime obfuscation.☆73Updated 7 months ago
- Troll TaskManager, and play with it .☆27Updated 2 months ago
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass AMSI scanning by redirecting AmsiScanBuf…☆59Updated 5 months ago
- Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠☆110Updated 2 weeks ago
- PandaCrypter is a C#-based tool designed to convert PowerShell scripts into obfuscated batch files (.bat) with encryption and additional …☆17Updated 2 months ago
- Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OS☆58Updated last month
- Decrypting yandex browser passwords☆26Updated 6 months ago
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆132Updated 5 months ago
- A lightweight remote access trojan in Rust☆31Updated last year
- Write-ups and proof of concepts of design and implementaion of various modern malwares.☆29Updated 2 years ago
- simple user-mode Rootkit☆107Updated 3 years ago
- ( 0day ) Local Privilege Escalation in IObit Malware Fighter☆157Updated 6 months ago