x86byte / LummaC2-StealerLinks
LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis
☆78Updated 5 months ago
Alternatives and similar repositories for LummaC2-Stealer
Users that are interested in LummaC2-Stealer are comparing it to the libraries listed below
Sorting:
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆118Updated 3 months ago
- ☆41Updated 10 months ago
- Yandex browser passwords and credit-cards decryption algorithm☆18Updated 3 months ago
- ☆120Updated 9 months ago
- A Free Open sourced crypter that builds a output .NET .exe Stub (Updated whenever I feel like it)☆16Updated 3 months ago
- A PowerShell malware that disables all the Windows Security features with UAC Bypass and Anti-VM features. (Designed to work both as a po…☆41Updated 2 months ago
- Ransomware written in go, encrypt - decrypt.☆26Updated 3 months ago
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to ne…☆21Updated 2 months ago
- Decrypting yandex browser passwords☆24Updated 3 months ago
- The best powershell obfuscator ever made☆109Updated this week
- Retrieve the Chrome App Bound key using DLL injection — no administrator privileges required and no need to run from the chrome folder in…☆33Updated 3 months ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆49Updated 3 months ago
- My POC implementation of HVNC (Hidden VNC / Hidden Desktop)☆26Updated 7 months ago
- This repository is a tool to create a .suo that when run by visual studio's will achieve code execution☆111Updated last year
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆25Updated 3 months ago
- the bear is an infostealer (grabber) malware written in C and assembly with the focus on evading detection.☆8Updated 10 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆75Updated 3 months ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆70Updated last year
- Введение в разработку вредоносных программ☆10Updated last year
- A lightweight remote access trojan in Rust☆30Updated last year
- Shellcode Loader Library.☆10Updated 6 months ago
- NCrypt portable crypter is a collection of C++ build tools, a tiny C compiler for the stub, and a useful codebase for anyone wanting to c…☆10Updated last year
- Implementing the ghostly hollowing PE injection technique using tampered syscalls.☆168Updated 4 months ago
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆125Updated 2 months ago
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆39Updated 8 months ago
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆113Updated 7 months ago
- simple user-mode Rootkit☆104Updated 2 years ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆63Updated 10 months ago
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆31Updated 2 years ago
- ☆38Updated last year