stealer

  1. plymouth

    stealc_v2 - stealer | Server-side decryption of the new Chrome encryption, MetaMask auto-brute, CVV2 collection and much more!

    stealc_v2 - a new version of our stealer! The stealc_v2 Build is written in C++ using WinAPI (all functions are dynamically loaded). The current build size is ~770kb (size may vary depending on versions). All working strings are obfuscated. The build does not load any third-party DLLs! We...
  2. distamx

    BLUEFOX V3 Private Stealer from the Developer [ RENT ]

    A comprehensive solution for large amounts of traffic and log management. Ready-made functionality for organizing work for you and your workers. Installed on your server and managed by you. Direct communication with the developer to discuss questions and suggestions, without support and sellers...
  3. StormStealer

    STORM | The Best Stealer Engine for Professionals | Windows | C++

    STORM - Stealer, developed by a team of professionals for the best users. The project is designed for maximum user convenience, fast and efficient operation, and, most importantly, secure operation. Each build is compiled on a real Windows Server system, and each new build is a unique assembly...
  4. N

    Void Stealer | V20 bypass | 80%+ knockback | 20+ browsers | 100+ extensions | Private morpher

    This project has been in development for over six months, rewritten almost from scratch several times, conducted thousands of different tests, announced a global Beta Test for everyone, and finally, we are ready to present you with a completely new project for stealing confidential data. The...
  5. RemusStealer

    Remus - 24/7 support, a stealer with unique functionality, 90% typing accuracy, even a child can figure it out | Стилер с уникальным функционалом

    Remus This is a MaaS stealer with new, and most importantly, useful functionality you haven't encountered anywhere else. It collects more data than ANY solution on the market. We've undergone extensive testing behind closed doors, and today we can offer you the most stable, convenient, and...
  6. Daxus

    🔥 70.13M | ULP | URL:LOG:PASS | ✅ DAXUS.PRO | UHQ+ 🔥

    🔥 70.13M | ULP | URL:LOGPASS 🔥 https://pixeldrain.com/u/qbbth1Su For the full database, check here: Telegram: @DaxusProBot Website: Daxus.pro ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Support: @DaxusHelp | News: t.me/Daxuschannel
  7. cybercorw124

    DaemonCrow Stealer V1.1.2 Source Code (Clear)

    DaemonCrow Stealer V1.1.2 2025 Based on C# & .NET Framework 4.8 Features -> Collects all targeted data directly in memory -> Operates without external libraries -> Produces a compact output stub (approximately 80 KB) -> Compatible with both 32-bit and 64-bit Windows systems -> Sends captured...
  8. LeakZero

    ✅✅✅ 30 BILLION ROWS | EZ PROFIT | ULP & LOGS | 0$ SUB | TG-BOT, SITE | 2100+ REVIEWS

    15,000,000,000+ records — Plans from $0 Professional platform for working with breach data. Complete picture for making informed decisions. @LeakZero_bot LeakZero.io Support Docs Professional solution for specialists, focused on results. ---> SUBSCRIPTION FOR REVIEW <---
  9. LeakZero

    LEAKZERO — №1 | 15KKK СТРОК | ПОЛНЫЕ ДАННЫЕ ЛОГОВ | От 0$/месяц | API, TG-BOT, САЙТ | VOUCH COPY

    15.000.000.000+ записей — Тарифы от 0$ Профессиональная платформа для работы с данными утечек. Полная картина для принятия обоснованных решений. @LeakZero_bot LeakZero.io Support Docs Профессиональное решение для специалистов, ориентированных на результат. --->...
  10. Man

    Writing a stealer on C

    Smile at this world, stay connected! In this article we will analyze the process of writing a simple info-stealer in C. Let's move on to practice! We collect information So, info-stealer is a type of malware, which, as the name suggests, is designed to collect information from infected...
  11. Man

    The stealer was distributed for a year through a legal software repository under the guise of tools for working with neural networks

    Experts from Kaspersky GReAT (Kaspersky Lab's Global Research and Analysis Team) discovered an attack on the software supply chain that lasted for almost a year. Through the Python Package Index (PyPI) software repository, attackers distributed malicious packages under the guise of tools for...
  12. A

    Ada Stealer 100% FUD | Cookies | Passwords | Crypto | Telegram

    Ada is a new undetected stealer that is now public after one year of private usage. For now everything is managed on telegram but a custom panel is already being developed. Every stub is heavily obfuscated and all groupchat links are protected by a server ensuring that no one will be able to...
  13. Man

    Raccoon Stealer creator broken: hacker pleaded guilty

    The Raccoon Stealer has received an upgrade to jail. Mark Sokolovsky has pleaded guilty to participating in the Raccoon Stealer malware distribution campaign. Sokolovsky and his co-conspirators distributed the Raccoon Stealer on a MaaS (Malware-as-a-Service) model, renting the software for $75...
  14. Man

    Hackers Have Implemented AI in the Rhadamanthys Stealer: What Are Their Goals?

    Criminals are actively mastering new techniques, creating non-standard malware. Researchers from Recorded Future have discovered that the threat actors behind the Rhadamanthys malware have added new artificial intelligence (AI)-based capabilities. A new feature called Seed Phrase Image...
  15. Friend

    RECORDSTEALER's Legacy: The Ghost of the Past in Today's Threats

    Even old threats can suddenly escalate. Recently, malware detection has become a key element of ensuring cybersecurity. One example of such a threat is the RECORDTEALER malware, also known as the RecordBreaker and the Raccoon Stealer V2. This infostealer, written in C, specialized in stealing...
  16. Friend

    Ailurophile Stealer: New Data Stealer Spreads Lightning Fast Among Cyber Villains

    A three-day trial period and a referral system do their job. In August of this year, researchers from Cyfirma discovered a new piece of malware in cyberspace aimed at stealing sensitive user data, such as passwords, browsing history and saved cookies. The information thief was named Ailurophile...
  17. Man

    Cookie Stealer

    How to build a basic Cookie Stealer. A cookie stealer is used to steal the SESSION data or cookie information such as login details of any unsuspecting victim. Once the link is visited, the cookie data of the user is taken and stored externally. They are then redirected to another page without...
  18. 0xe1

    MacOS Stealer Banshee Stealer - x86_64 ARM64

    ⚠️Escrow ONLY⚠️ Hello everyone! We are glad to present you our new product - macOS stealer "Banshee Stealer". Extensive functionality, beautiful design, speed - all this is "Banshee Stealer". VIDEOS in TELEGRAM CHANNEL!!! (TELEGRAM CHANNEL: https://t.me/stealer_banshee) VIDEOS in TELEGRAM...
  19. Friend

    An Ancient Evil Has Awakened: Cthulhu Stealer Steals Crypto Assets on macOS

    How the good old GTA IV served as bait to disguise a new virus. Researchers from Cado Security have discovered a new piece of malware targeting users of the macOS operating system. Dubbed the 'Cthulhu Stealer', this malware is designed to collect a wide range of data from Apple devices...
  20. Friend

    AMOS Stealer: the updated version of the malware is aimed at your cryptocurrency

    Researchers link the attacks to a mysterious group called Crazy Evil. Security researchers at Moonlock have discovered a new wave of activity in the AMOS malware, also known as Atomic Stealer. Attackers allegedly linked to the hacker group Crazy Evil spread malware through fake advertising...

stealer

stealer

Share this tag

Top