11whoami99 / XSS-keyloggerView external linksLinks
A Simple JS code to keylogger data and send it to the personal server
☆31Dec 30, 2024Updated last year
Alternatives and similar repositories for XSS-keylogger
Users that are interested in XSS-keylogger are comparing it to the libraries listed below
Sorting:
- BlackHat Asia 2025 code and presentations☆18Apr 13, 2025Updated 10 months ago
- Some useful books related to Cybersecurity, Linux and more.☆71Dec 31, 2025Updated last month
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- Telegram base free Rat☆11Apr 26, 2025Updated 9 months ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 2 years ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- ☆12Dec 15, 2024Updated last year
- Proof of Concept Exploit for CVE-2024-9465☆30Oct 9, 2024Updated last year
- BlitzSSH is a multi-threaded SSH brute-force tool with Telegram integration for real-time notifications.☆13Nov 20, 2025Updated 2 months ago
- ☆15May 3, 2024Updated last year
- Advanced test for proxy & waf☆13Sep 13, 2025Updated 5 months ago
- ☆28Sep 9, 2024Updated last year
- CoupDeWeb is an automated web vulnerability scanner designed for security researchers and developers. It scans for potential vulnerable …☆28Oct 17, 2024Updated last year
- Bulk scanning tool for ServiceNow CVE-2024-4879 vulnerability☆10Jul 12, 2024Updated last year
- A tool for secrets management, encryption as a service, and privileged access management☆13Jul 17, 2025Updated 6 months ago
- dump Chrome cookies remotely with atexec and CDP☆68Aug 10, 2024Updated last year
- Guía completa para configurar y utilizar servicios financieros NO-KYC. Este repositorio cubre herramientas de finanzas digitales anónimas…☆16Aug 7, 2024Updated last year
- Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploit☆18Jun 3, 2024Updated last year
- SprayShark is a modular G-Suite password sprayer with threading!☆57May 17, 2025Updated 8 months ago
- GBounty Profiles are customizable security test definitions used by the GBounty web scanner to identify vulnerabilities in web applicatio…☆25Mar 11, 2025Updated 11 months ago
- A structured red-team prompt for generating ethical hacking tools using AI - designed for use in labs, CTFs, and authorized security asse…☆25Jun 26, 2025Updated 7 months ago
- Tool to aid in dumping LSASS process remotely☆42Sep 23, 2025Updated 4 months ago
- PackageSpy is a versatile command-line tool designed to simplify the process of searching for packages on two popular package managers☆22Jun 19, 2024Updated last year
- ☆21Nov 6, 2024Updated last year
- Top 400 passwords as per HaveIBeenPwned☆22Oct 14, 2024Updated last year
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆50Jan 12, 2025Updated last year
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆31Jan 27, 2025Updated last year
- ☆19Sep 24, 2025Updated 4 months ago
- Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)☆23Jul 23, 2024Updated last year
- RCE through a race condition in Apache Tomcat☆56Dec 21, 2024Updated last year
- Repo for all my exploits/PoCs☆52May 6, 2025Updated 9 months ago
- An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and…☆105Apr 21, 2024Updated last year
- Tool to bypass LSA Protection (aka Protected Process Light)☆64Jan 2, 2025Updated last year
- Two in one, patch lifetime powershell console, no more etw and amsi!☆103Apr 27, 2025Updated 9 months ago
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆98Oct 4, 2024Updated last year
- Cross-platform username reconnaissance tool built for OSINT investigators, cyber threat analysts, red teamers, and CTF enthusiasts.☆116Aug 10, 2025Updated 6 months ago
- Online-Crawler-Wayback-Machine☆27Oct 15, 2024Updated last year
- Collection of codes focused on Linux rootkits☆197Oct 22, 2025Updated 3 months ago
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆32Apr 14, 2025Updated 10 months ago