youlha1 / thebearLinks
the bear is an infostealer (grabber) malware written in C and assembly with the focus on evading detection.
☆11Updated last year
Alternatives and similar repositories for thebear
Users that are interested in thebear are comparing it to the libraries listed below
Sorting:
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆92Updated 9 months ago
- PandaCrypter is a C#-based tool designed to convert PowerShell scripts into obfuscated batch files (.bat) with encryption and additional …☆40Updated 3 months ago
- ☆129Updated last year
- ☆49Updated last year
- NCrypt portable crypter is a collection of C++ build tools, a tiny C compiler for the stub, and a useful codebase for anyone wanting to c…☆16Updated last year
- Ransomware written in go, encrypt - decrypt.☆30Updated 7 months ago
- A runtime Crypter written in C++ to bypass AVs signature based detection☆37Updated 2 years ago
- A Free Open sourced crypter that builds a output .NET .exe Stub (Updated whenever I feel like it)☆19Updated last month
- My POC implementation of HVNC (Hidden VNC / Hidden Desktop)☆27Updated 11 months ago
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆130Updated 7 months ago
- A PowerShell malware that disables all the Windows Security features with UAC Bypass and Anti-VM features. (Designed to work both as a po…☆43Updated 6 months ago
- ☆11Updated last year
- Google Chrome Cookies Stealer. Steals Chrome cookies☆47Updated 2 years ago
- Selective In-Memory Syscall Unhooking, a stealthy method to bypass user-mode hooks in ntdll.dll☆20Updated 4 months ago
- Yandex browser passwords and credit-cards decryption algorithm☆21Updated 7 months ago
- This repository is a tool to create a .suo that when run by visual studio's will achieve code execution☆110Updated 2 years ago
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆13Updated 7 months ago
- Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OS☆57Updated last week
- The best powershell obfuscator ever made☆117Updated 4 months ago
- Multi-component Remote Access Trojan: C++ client (victim), C# server, and Angular frontend.☆40Updated 7 months ago
- A lightweight remote access trojan in Rust☆31Updated last year
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆26Updated 7 months ago
- Cronos Crypter is an simple example of crypter created for educational purposes.☆102Updated last year
- Satanic Crypter A powerful tool designed to convert EXE files into BAT files with advanced features and a modern GUI interface.☆10Updated 11 months ago
- A uacbypass that works on medium IL that abuses EventViewers unsafe deserialization to RecentViews☆15Updated 2 years ago
- Tool to evade Antivirus With Different Techniques☆193Updated 2 years ago
- A simple and efficent script to obfuscate python payloads to make it completely FUD☆37Updated 2 years ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆87Updated 7 months ago
- HVNC hidden remote VNC desktop with filemanager and backconnect☆44Updated 11 months ago
- A unique introduction to native runtime obfuscation.☆74Updated 9 months ago