Git Product home page Git Product logo

digitalabstraction's Projects

alien-crypter-crack-source-code icon alien-crypter-crack-source-code

Crypter is intended for educational and research purposes only. This software should not be used within any system or network for which you do not have permission, nor should it be used for any illegal or illicit purposes. The author takes no responsibility for any damages that may be caused by the software in this repository. Once compiled, Crypter WILL encrypt the files on the computer on which it is executed. Whilst Crypter provides you with access to the decryption key, enabling you to decrypt any encrypted files, bugs and other issues could, in theory, interrupt or prevent a successful decryption. Consequently, a permanent and irreversible loss of data could occur. To avoid any potential damage, you should only run Crypter on a test machine created for this purpose.

bitrat-hvnc-rat-remote-control-av-bypass icon bitrat-hvnc-rat-remote-control-av-bypass

BitRAT CrackedIt is coded in C++ programming language. It is the latest version of the best PC RAT 2022 in the market. It is used by hackers to remotely access their victims. This RAT can handles up to 10k bots at a single time without any kind of lag and low CPU usages. It can bind 5 files up to a time. It is the best pc remote administration tool for 2022. This best remote desktop software 2022 supports all-new browser versions for the password recovery feature. Their password recovery feature is updated every time and recovers passwords from all updated browsers. It is the best RAT tool for 2022.

blackout icon blackout

kill anti-malware protected processes (BYOVD)

blank-grabber icon blank-grabber

A trojan written in python 3 and packed with a whole lot of features with minimum dependencies and an interactive builder!

burp-suite icon burp-suite

|| Activate Burp Suite Pro with Key-Generator and Key-Loader ||

data-encoder-crypter-encoded-aes-hidden-startup icon data-encoder-crypter-encoded-aes-hidden-startup

Compile xtea.cpp to create xtea.exe. Drag & drop file you want to encrypt (put in crypter) on xtea.exe. This will encrypt the file. Compile shellcode_generator.c to create shellcode_generator.exe. Drag & drop file (encrypted with xtea) on shellcode_generator.exe. This will create shellcode.h which contains the bytes of encrypted file. Make sure that shellcode.h and runPE.h are in the same directory as file.cpp. Compile file.cpp to create file.exe. Running file.exe will decrypt and run file from the first step. file.exe stores the (encrypted) bytes of an executable in itself, when you run it, it decrypts and runs in memory those bytes, by a method called runPE. It does not drop anything on the HD.

discord-advanced-token-grabber-v1-wallet-password-cookies-more icon discord-advanced-token-grabber-v1-wallet-password-cookies-more

Detect banking & cryptocurrency services in browsers Steam, Uplay, Battle.Net, Minecraft session Install keylogger & clipper Desktop & Webcam screenshot ProtonVPN, OpenVPN, NordVPN Crypto Wallets Zcash, Armory, Bytecoin, Jaxx, Exodus, Ethereum, Electrum, AtomicWallet, Guarda, Coinomi, Litecoin, Dash, Bitcoin Crypto Wallet Extensions from Chrome & Edge Binance, coin98, Phantom, Mobox, XinPay, Math10, Metamask, BitApp, Guildwallet, iconx, Sollet, Slope Wallet, Starcoin, Swash, Finnie, KEPLR, Crocobit, OXYGEN, Nifty, Liquality, Auvitas wallet, Math wallet, MTV wallet, Rabet wallet, Ronin wallet, Yoroi wallet, ZilPay wallet, Exodus, Terra Station, Jaxx. Messenger Sessions, Accounts, Tokens Discord, Telegram, ICQ, Skype, Pidgin, Outlook, Tox, Element, Signal

discord-image-token-password-grabber-exploit-cve-2022 icon discord-image-token-password-grabber-exploit-cve-2022

Get system info (Version, CPU, GPU, RAM, IPs, BSSID, Location, Screen metrics, Installed apps) Chromium based browsers (passwords, credit cards, cookies, history, autofill, bookmarks) Firefox based browsers (db files, cookies, history, bookmarks) Internet explorer/Edge (passwords) Saved wifi networks & scan networks around device (SSID, BSSID) s File grabber (Documents, Images, Source codes, Databases, USB) Detect banking & cryptocurrency services in browsers Steam, Uplay, Battle.Net, Minecraft session Install keylogger & clipper Desktop & Webcam screenshot

discord-token-grabber-stealer-password-cookies-history icon discord-token-grabber-stealer-password-cookies-history

Discord webhooks & Telegram integration. Grabs tokens from all installed clients even if the main path changed and deletes accounts duplicates. 18 hardcoded known tokens locations :(. Grabs PC information + token information (IP, CPU, GPU, WINKEY). Grabs Discord password and sending the new info with every event that involves password. Sends screenshot of all screens at the moment of the grabbing (all screens). Grabs browser cookies and passwords. Supports Brave, Chrome, Firefox, and OperaGx. [Password & Cookies stealer] WIFI passwords stealer. Crypto-clipper. Feature to steal most of based Gecko & Chromium browsers. Self-updating, When a new account is logged or password changed will be sent again with the new information. Bypasses Anti-Token-Grabbers.

discord-token-grabber-v1 icon discord-token-grabber-v1

Discord webhooks & Telegram integration. Grabs tokens from all installed clients even if the main path changed and deletes accounts duplicates. 18 hardcoded known tokens locations :(. Grabs PC information + token information (IP, CPU, GPU, WINKEY). Grabs Discord password and sending the new info with every event that involves password. Sends screenshot of all screens at the moment of the grabbing (all screens). Grabs browser cookies and passwords. Supports Brave, Chrome, Firefox, and OperaGx. [Password & Cookies stealer] WIFI passwords stealer. Crypto-clipper. Feature to steal most of based Gecko & Chromium browsers. Self-updating, When a new account is logged or password changed will be sent again with the new information. Bypasses Anti-Token-Grabbers.

exodus-exploit-stealer-login-bypass-hack-any-account icon exodus-exploit-stealer-login-bypass-hack-any-account

Features Of Exodus Stealer Reborn Functions -Autofill -Cookies -Passwords -Bookmarks -History -Credit Cards -Steals System INFO -Install Application -Running Application -Screenshot -Product Key -Sets And Grabs Clipboard -Steals System Hardware info -Ip info and geoip location -System based bssid location -Wifi Saved Password -Webcam Screenshot -Useragent -Steals Information From Mail Clients

fuckclipper icon fuckclipper

еще один ебучий клиппер, но лучше

hta-exploit-downloader-malware-builder icon hta-exploit-downloader-malware-builder

Features: -Include silent doc exploit -Several exploits, most are sendable via GMail -Compatible with every rat/keylogger/worm -Compatible with Windows XP - Windows 10 32/64 -FUD (DOC CHM) -Works with every MS Office from 2007 to 2016 (excluding Starter edition - there's no macro support) -Startup -base64 encode

laravel-imap icon laravel-imap

Laravel IMAP is an easy way to integrate both the native php-imap module and an extended custom imap protocol into your Laravel app.

netify icon netify

Chrome extension to intercept and modify network requests.

raasnet icon raasnet

Open-Source Ransomware As A Service for Linux, MacOS and Windows

slient-doc-pdf-exploit-builder-fud-malware-cve icon slient-doc-pdf-exploit-builder-fud-malware-cve

Vulnerability Disclosure Timeline Closer inspection of the Exploit PDF content reveals the malicious link as well as the URL Download and Execute of the tool used to generate the Exploit PDF from Python encrypted code content which we also implement in couple of our builders. Silent PDF Exploit silent-pdf-exploit-2018silent-pdf-exploit-2018 Silent PDF Exploit There are multiple Exploit PDF in Silent PDF Exploit, a package commonly used by web services to process Exploit PDF File. One of the vulnerabilities can lead to remote code execution (RCE) if you process user submitted PDF. The exploit for this vulnerability is being used in the wild. Why Are You Disclosing A Exploit PDF We have collectively determined that these vulnerabilities are available to individuals other than the person(s) who discovered them. An unknowable number of people having access to these vulnerabilities makes this a critical issue for everyone using this software.

smtp-cracker icon smtp-cracker

[NEW] : Simple Mail Transfer Protocol (SMTP) CHECKER - CRACKER Tool V2

terminator icon terminator

Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.