the bear is an infostealer (grabber) malware written in C and assembly with the focus on evading detection.
☆16Sep 8, 2024Updated last year
Alternatives and similar repositories for thebear
Users that are interested in thebear are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- All my POC related to malware development☆15Feb 19, 2026Updated 2 months ago
- A ring0 Loadable Kernel Module (Linux) to log all commnds run on the system.☆17Sep 30, 2025Updated 6 months ago
- Manage variables effectively when playing CTFs☆10Jul 26, 2025Updated 8 months ago
- Extended Static Analysis Tool for Analyzing Android APK Files.☆15Jan 3, 2024Updated 2 years ago
- Specific C2 Detection Tool Written To Detect C2 Servers From RisePro Stealer Malware.☆13Nov 10, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A few STUXNET samples and live traffic captures from July 2010 while many stuxnet implants were still operational.☆29Sep 17, 2024Updated last year
- Just a git repo for the sleepmask detection rule i found in https://codex-7.gitbook.io/codexs-terminal-window/blue-team/detecting-cobalt-…☆16Jun 4, 2025Updated 10 months ago
- A minimalistic android backdoor☆19Aug 1, 2020Updated 5 years ago
- Utilizing DLang For Offensive Operations.☆14May 29, 2025Updated 10 months ago
- This repo is for the youtube video where we have explained how to make a detectable reverse shell undetectable by windows defender☆29Mar 16, 2024Updated 2 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- AES-encrypted TCP/IP swiss army knife.☆11Nov 6, 2022Updated 3 years ago
- A rework of CMLuaUtil AutoElevated☆30Nov 6, 2022Updated 3 years ago
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆35Feb 2, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆42Feb 18, 2025Updated last year
- 🌐 A curated list of anonymous networks & research papers☆21Apr 1, 2026Updated 2 weeks ago
- AIDA64DRIVER Elevation of Privilege Vulnerability☆17Oct 25, 2024Updated last year
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- Driver Reverse & Exploitation☆82Sep 4, 2025Updated 7 months ago
- Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle…☆16Jan 7, 2023Updated 3 years ago
- 😎 A curated list of amazingly awesome stencil components, resources and solutions.☆12Mar 12, 2020Updated 6 years ago
- A command-line tool to temporary hide/unhide Instagram stories from all of your followers☆23Jan 30, 2021Updated 5 years ago
- EDR/AV Simulation for Malware Development☆13Oct 21, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- World's First Haiku Ransomware/Malware☆16Dec 22, 2024Updated last year
- Exploring different process injection techniques based on malware analysis☆14Dec 28, 2023Updated 2 years ago
- An open-source cheat for Assault Cube, showcased during my lectures, shared for you to learn from.☆11Mar 13, 2026Updated last month
- For educational purpose only.There is a collection of 500+ rats here. Remote-administration-tools-archive.analyze them in a insolated env…☆32Nov 13, 2025Updated 5 months ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13May 19, 2024Updated last year
- Введение в разработку вредоносных программ☆12Oct 15, 2023Updated 2 years ago
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆23Feb 17, 2024Updated 2 years ago
- ☆32Nov 4, 2025Updated 5 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Process injection via native Windows APIs (NTAPIs)☆15Jan 16, 2024Updated 2 years ago
- Collection of different rootkit functionality, each driver representing a different rootkit component☆13May 27, 2025Updated 10 months ago
- A project for building Linux && IoT Malware for fun and no-profit☆17Jan 24, 2025Updated last year
- Proof of concept (PoC) for CVE-2024-27316 (tested), CVE-2024-30255 (untested), CVE-2024-31309 (untested), CVE-2024-28182 (untested), CVE-…☆16Apr 13, 2024Updated 2 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- API Worker template to create cloudflare worker using wrangler☆10May 11, 2020Updated 5 years ago
- Криптор на шелл-кодах☆11May 3, 2020Updated 5 years ago