youlha1 / thebearView external linksLinks
the bear is an infostealer (grabber) malware written in C and assembly with the focus on evading detection.
☆13Sep 8, 2024Updated last year
Alternatives and similar repositories for thebear
Users that are interested in thebear are comparing it to the libraries listed below
Sorting:
- All my POC related to malware development☆14May 13, 2024Updated last year
- This repo is for the youtube video where we have explained how to make a detectable reverse shell undetectable by windows defender☆29Mar 16, 2024Updated last year
- Satanic Crypter A powerful tool designed to convert EXE files into BAT files with advanced features and a modern GUI interface.☆10Jan 4, 2025Updated last year
- A few STUXNET samples and live traffic captures from July 2010 while many stuxnet implants were still operational.☆29Sep 17, 2024Updated last year
- Material For Malware Analysis Fundamentals Workshop By Eslam Abbas "Mr Robot"☆22Oct 9, 2025Updated 4 months ago
- A rework of CMLuaUtil AutoElevated☆30Nov 6, 2022Updated 3 years ago
- Discord RAT made in powershell (open source)☆12Jul 16, 2025Updated 7 months ago
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆34Feb 2, 2026Updated 2 weeks ago
- Driver Reverse & Exploitation☆82Sep 4, 2025Updated 5 months ago
- ☆42Feb 18, 2025Updated 11 months ago
- 😎 A curated list of amazingly awesome stencil components, resources and solutions.☆12Mar 12, 2020Updated 5 years ago
- Comprehensive tutorial and toolkit for football data webscraping using Python, Selenium, and various scraping techniques☆49Oct 14, 2025Updated 4 months ago
- SOURCE CC CHECKER API☆13May 19, 2020Updated 5 years ago
- ☆14May 14, 2022Updated 3 years ago
- A backdoor is a tool used to gain remote access to a machine. Typically, backdoor utilities such as NetCat have 2 main functions: to pip…☆13Apr 26, 2021Updated 4 years ago
- Automated pipeline for downloading, staging, ingesting, and investigating leaked and declassified archives (DDoSecrets, National Security…☆31Sep 22, 2025Updated 4 months ago
- AES-encrypted TCP/IP swiss army knife.☆11Nov 6, 2022Updated 3 years ago
- DIGI-NETRA 🕵️♂️ is a Python OSINT toolkit for digital investigations. Trace phone numbers 📞, usernames 👤, IPs 🌐, and emails ✉️ with …☆23Aug 27, 2025Updated 5 months ago
- Decoupled AI copilot for pentesting & CTFs. Sidecar tails your shell history, parses tool outputs, grounds suggestions in your notes, and…☆13Nov 21, 2025Updated 2 months ago
- Just a git repo for the sleepmask detection rule i found in https://codex-7.gitbook.io/codexs-terminal-window/blue-team/detecting-cobalt-…☆16Jun 4, 2025Updated 8 months ago
- This repository contains code to build an optical character recognition (OCR) model for recognizing text in captcha images using a Convol…☆14Sep 25, 2023Updated 2 years ago
- ☆10Jan 6, 2019Updated 7 years ago
- This project enables malware to resurrect and remain hidden even after termination, using a User-Mode Program and Kernel-Mode Driver as p…☆10Jan 7, 2025Updated last year
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- example apps for inference.sh☆18Feb 9, 2026Updated last week
- UnitySteamLobby☆10Oct 8, 2022Updated 3 years ago
- Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum…☆17Jun 12, 2025Updated 8 months ago
- Powershell scripts for exfiltration.☆12Oct 5, 2024Updated last year
- AIDA64DRIVER Elevation of Privilege Vulnerability☆16Oct 25, 2024Updated last year
- A comprehensive guide to becoming a hacker, covering skills, tools, and best practices to master cybersecurity and hacking techniques.☆16May 22, 2025Updated 8 months ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle…☆16Jan 7, 2023Updated 3 years ago
- Введение в разработку вредоносных программ☆11Oct 15, 2023Updated 2 years ago
- ImperiumRAT is an advanced remote administration tool with features like (Remote desktop, Disable CMD, Turn on/off webcam, and more!)☆12Dec 7, 2022Updated 3 years ago
- HID payloads for good purpose☆10Dec 17, 2024Updated last year
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆15Jan 14, 2019Updated 7 years ago
- 🌐 A curated list of anonymous networks & research papers☆17Oct 15, 2024Updated last year
- Open source python wrapper to Messenger API☆16Jul 12, 2024Updated last year
- Utilizing DLang For Offensive Operations.☆14May 29, 2025Updated 8 months ago