WealthyMindset's starred repositories
fakelogonscreen
Fake Windows logon screen to steal passwords
Android-RATList
Android - Remote Access Trojan List
SilentXMRMiner
A Silent (Hidden) Monero (XMR) Miner Builder
WifiPassword-Stealer
Get All Registered Wifi Passwords from Target Computer.
TeleKiller
A Tools Session Hijacking And Stealer Local Passcode Telegram Windows
silentarmy
Zcash miner optimized for AMD & Nvidia GPUs
DigiSparkStealer
Script for Digispark Attiny85, ATMEGA32U4 to steal passwords, cookies and send to your mail
AndroidMalware_2019
Popular Android threats in 2019
Lime-Miner
a simple hidden silent XMR miner.
TeleShadow3
Telegram Desktop Session Stealer
TeleShadow2
TeleShadow - Telegram Desktop Session Stealer (Windows)
Hidden-miner-builder
Hidden miner builder
Cookie-stealer
Crappy cookie stealer
bitcoinstealer
POC Bitcoin stealer
escrow-service-bot
The Escrow Service Bot offers an automated service acting as an escrow platform, able to facilitate a completely save trade environment on which both the seller and buyer can thrive and do business happily
InfoStealer
Info and password stealer
cyclic-vacuum-cannon
First it steals.. Then it jettisons.
cookie_stealer
steal cookies from firefox cookies database(cookies.sqlite)
cookie-stealer
Simple PHP - Javascript - Webserver Cookie Stealer Script for XSS
BitcoinStealer-OnlyForEducationPurpose
Disclaimer :- I am not promoting any illegal activity here . this is purely for educational purpose . i am not responsible if you use it for illegal purpose .
awesome-ico-truths
Awesome Initial Coin Offerings (ICO) Truths - The Art of the Steal - The Scammers' Big Lies ++ ICO tokens are like bitcoins, ICOs are like IPOs, ICO White Papers are like "Due Diligence" Inverstor Prospectus, ...
BtcStealer
rootkit that wait user to copy a bitcoin adress then change it with the attacker adress when the victim paste it
Android-SMS-Listener
An example of how a mobile (Android) application that performs a useful function could contain hidden malicious software (CPS633 - Computer Security).
Applications
Collection of small applications developed for research purpose.