5nyper / nim-keyloggerLinks
A Windows keylogger using Nim's windows module
☆8Updated 10 years ago
Alternatives and similar repositories for nim-keylogger
Users that are interested in nim-keylogger are comparing it to the libraries listed below
Sorting:
- lightweight http redirector written in nim☆11Updated 2 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆14Updated 2 years ago
- Handy script to automate the attack☆21Updated 5 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆29Updated 6 years ago
- a simple backdoor in Nim☆19Updated 3 years ago
- Shellcode process injector☆27Updated 5 years ago
- A malicious KeePass plugin to exfiltrate the master key.☆14Updated 3 years ago
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- Offensive go lang series☆32Updated 5 years ago
- Rawsec's Cybersecurity Inventory cli. Search pentesting tools, resources, ctf, os.☆25Updated this week
- Easily-guessable Password Generator for Password Spray Attack☆21Updated 5 years ago
- Python3 tool to perform password spraying using RDP☆17Updated last year
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- NanoDumpInject from https://s3cur3th1ssh1t.github.io/Reflective-Dump-Tools/ , minor edits with a few syscalls☆11Updated 3 years ago
- Automated Penetration Testing☆14Updated 4 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- Windows privilege escalation Mafia is a framework provides all resources needed for privilege escalation beginners☆12Updated 3 years ago
- Reverse Shell troll software☆12Updated 5 years ago
- A simple Nim stager (w/ fiber execution)☆18Updated 3 years ago
- 3gsocks - a reverse connection socks5 based network pivot☆10Updated 4 years ago
- PyEvade is a simple tool to bypass many antivirus solutions on windows for metasploit payloads.☆16Updated 7 years ago
- Red Team C2 and Post Exploitation Code☆36Updated 3 months ago
- Generic malicious browser check written in C#☆13Updated 8 years ago
- A cross-platform Nim implant for Prelude Operator☆32Updated 3 years ago
- FETB : Take URL of File For Analysis using File + ExifTool + Binwalk Commands☆22Updated 4 years ago
- ☆16Updated 2 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 5 years ago
- Automatic DLL comment link generation and explaination of the DLL Proxying techniques☆10Updated 3 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Stock Management System v1.0 al…☆21Updated 4 years ago