the bear is an infostealer (grabber) malware written in C and assembly with the focus on evading detection.
☆17Sep 8, 2024Updated last year
Alternatives and similar repositories for thebear
Users that are interested in thebear are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- All my POC related to malware development☆15Feb 19, 2026Updated last month
- A ring0 Loadable Kernel Module (Linux) to log all commnds run on the system.☆17Sep 30, 2025Updated 5 months ago
- Manage variables effectively when playing CTFs☆10Jul 26, 2025Updated 8 months ago
- Extended Static Analysis Tool for Analyzing Android APK Files.☆15Jan 3, 2024Updated 2 years ago
- Specific C2 Detection Tool Written To Detect C2 Servers From RisePro Stealer Malware.☆13Nov 10, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A few STUXNET samples and live traffic captures from July 2010 while many stuxnet implants were still operational.☆29Sep 17, 2024Updated last year
- Just a git repo for the sleepmask detection rule i found in https://codex-7.gitbook.io/codexs-terminal-window/blue-team/detecting-cobalt-…☆16Jun 4, 2025Updated 9 months ago
- A minimalistic android backdoor☆19Aug 1, 2020Updated 5 years ago
- Utilizing DLang For Offensive Operations.☆14May 29, 2025Updated 10 months ago
- This repo is for the youtube video where we have explained how to make a detectable reverse shell undetectable by windows defender☆29Mar 16, 2024Updated 2 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- AES-encrypted TCP/IP swiss army knife.☆11Nov 6, 2022Updated 3 years ago
- A rework of CMLuaUtil AutoElevated☆30Nov 6, 2022Updated 3 years ago
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆35Feb 2, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- 🌐 A curated list of anonymous networks & research papers☆18Oct 15, 2024Updated last year
- ☆42Feb 18, 2025Updated last year
- AIDA64DRIVER Elevation of Privilege Vulnerability☆16Oct 25, 2024Updated last year
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- Driver Reverse & Exploitation☆82Sep 4, 2025Updated 6 months ago
- Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle…☆16Jan 7, 2023Updated 3 years ago
- 😎 A curated list of amazingly awesome stencil components, resources and solutions.☆12Mar 12, 2020Updated 6 years ago
- A command-line tool to temporary hide/unhide Instagram stories from all of your followers☆23Jan 30, 2021Updated 5 years ago
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- EDR/AV Simulation for Malware Development☆13Oct 21, 2023Updated 2 years ago
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆19May 8, 2025Updated 10 months ago
- World's First Haiku Ransomware/Malware☆16Dec 22, 2024Updated last year
- ☆32Nov 4, 2025Updated 4 months ago
- For educational purpose only.There is a collection of 500+ rats here. Remote-administration-tools-archive.analyze them in a insolated env…☆30Nov 13, 2025Updated 4 months ago
- Exploring different process injection techniques based on malware analysis☆14Dec 28, 2023Updated 2 years ago
- An open-source cheat for Assault Cube, showcased during my lectures, shared for you to learn from.☆11Mar 13, 2026Updated 2 weeks ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13May 19, 2024Updated last year
- Введение в разработку вредоносных программ☆11Oct 15, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆23Feb 17, 2024Updated 2 years ago
- example apps for inference.sh☆22Updated this week
- Process injection via native Windows APIs (NTAPIs)☆15Jan 16, 2024Updated 2 years ago
- Collection of different rootkit functionality, each driver representing a different rootkit component☆14May 27, 2025Updated 10 months ago
- Proof of concept (PoC) for CVE-2024-27316 (tested), CVE-2024-30255 (untested), CVE-2024-31309 (untested), CVE-2024-28182 (untested), CVE-…☆16Apr 13, 2024Updated last year
- A project for building Linux && IoT Malware for fun and no-profit☆17Jan 24, 2025Updated last year
- API Worker template to create cloudflare worker using wrangler☆10May 11, 2020Updated 5 years ago