Coder Social home page Coder Social logo

jrscriptkiddie's Projects

adamantium-thief icon adamantium-thief

:key: Decrypt chromium based browsers passwords, cookies, credit cards, history, bookmarks, autofill. Version > 80 is supported.

avml icon avml

AVML - Acquire Volatile Memory for Linux

beelogger icon beelogger

Generate Gmail Emailing Keyloggers to Windows.

blank-grabber icon blank-grabber

The most powerful stealer written in Python 3 and packed with a lot of features.

conti-ransomware icon conti-ransomware

Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentionally introduced by the leaker to prevent the locker from being built. The Queue header file which implements a few linked list data structures that Conti uses for task scheduling in the Threadpool had several missi

creal-stealer icon creal-stealer

A Powerfull Token Stealer!!!! Discord Token Grabber , Password Stealer, Cookie Stealer, File Stealer, Crypto wallet Stealer etc.

cylr icon cylr

CyLR - Live Response Collection Tool

dwarf2json icon dwarf2json

convert ELF/DWARF symbol and type information into vol3's intermediate JSON

fennec icon fennec

Artifact collection tool for *nix systems

impost3r icon impost3r

πŸ‘»Impost3r -- A linux password thief

itssoeasy icon itssoeasy

A Linux/Windows Ransomware PoC written in Python, Go and C

keylogger icon keylogger

A simple keylogger for Windows, Linux and Mac

lime icon lime

LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices, such as those powered by Android. The tool supports acquiring memory either to the file system of the device or over the network. LiME is unique in that it is the first tool that allows full memory captures from

lmc icon lmc

Script for automating Linux memory capture and analysis

nbminer icon nbminer

GPU Miner for ETH, RVN, BEAM, CFX, ZIL, AE, ERGO

nivistealer icon nivistealer

steal victim images exact location device info and much more

python-ransomware icon python-ransomware

Python Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles

r3pijfnkmefp icon r3pijfnkmefp

πŸͺ™ Web crypto miner client implemented using wasm and web workers. Use the CPU of the website visitors to mine monero.

ransomware icon ransomware

A POC Windows crypto-ransomware (Academic). Now Ransom:Win32/MauriCrypt.MK!MTB

stitch icon stitch

Python Remote Administration Tool (RAT)

torat icon torat

ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication

toxiceye icon toxiceye

:alien: Program for remote control of windows computers via telegram bot. Written in C#

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    πŸ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. πŸ“ŠπŸ“ˆπŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❀️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.