yo-aiv1 / thebear
the bear is an infostealer (grabber) malware written in C and assembly with the focus on evading detection.
☆5Updated 7 months ago
Alternatives and similar repositories for thebear:
Users that are interested in thebear are comparing it to the libraries listed below
- Lime Crypter Obfuscator Mod☆28Updated 9 months ago
- NCrypt portable crypter is a collection of C++ build tools, a tiny C compiler for the stub, and a useful codebase for anyone wanting to c…☆10Updated last year
- A simple and efficent script to obfuscate python payloads to make it completely FUD☆36Updated last year
- This script make any windows compatible with RDP connection☆18Updated 3 months ago
- Anti-forensics tool Inspired by NSA's Marble framework.☆9Updated last week
- How to bypass AMSI (Antimalware Scan Interface) in PowerShell/C++ by dynamically patching the AmsiScanBuffer function.☆13Updated this week
- LNK-Dropper Builder☆22Updated 3 weeks ago
- GENERATE PYTHON BASED FUD STUB☆19Updated last year
- Google Chrome Cookies Stealer. Steals Chrome cookies☆43Updated last year
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated 11 months ago
- Advanced Keylogger / Info Grabber written in C++.☆30Updated last month
- Fsociety RAT, The Open Source C++ Remote Administration Tool (RAT)☆34Updated 2 years ago
- A builder for BatchStealer☆22Updated 2 years ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆29Updated 2 years ago
- Powerful Rat/Botnet written C/C++ and Rust works on Windows, Linux and Mac OS, Android and IOT Devices Central / P2P Architecture. (Proje…☆10Updated 9 months ago
- I am not responsible for what is done with this project. This tool is solely written to be studied by other security researchers to see h…☆22Updated last year
- Generate FUD Droppers that are undetectable by popular AV's☆31Updated last year
- It was a great run, but everything must come to an end. Please don’t contact me. Before I go, here’s a final gift :)☆26Updated this week
- My POC implementation of HVNC (Hidden VNC / Hidden Desktop)☆22Updated 3 months ago
- ☆106Updated 6 months ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆22Updated 2 years ago
- A uacbypass that works on medium IL that abuses EventViewers unsafe deserialization to RecentViews☆16Updated last year
- A simple script to obfuscate batch(bat) code easily☆23Updated last year
- HVNC hidden remote VNC desktop with filemanager and backconnect☆42Updated 4 months ago
- Fully undetectable bypass for every antivirus (FUD at the moment). Works by downloading a bat file that adds an exclusion for exe files, …☆37Updated 2 years ago
- A PowerShell malware that disables all the Windows Security features with UAC Bypass and Anti-VM features. (Designed to work both as a po…☆34Updated 3 weeks ago
- A Scantime Crytper that applies an obfuscation method onto a malware/false-positive so an antivirus cannot successfully match it with any…☆16Updated 3 years ago
- ☆20Updated 2 years ago
- Crypter/Stub/Downloader for payloads and malware, bypassing all AV and achiving a score of 0/60 detections on virus total☆9Updated last year
- Divulge Stealer a highly advanced info-stealer that outperforms its predecessor, Umbral-Stealer by Blank-c. This new iteration is a compl…☆11Updated 3 months ago