AlirezaChegini / kernel-based-keylogger-for-LinuxLinks
A simplex kernel-based keylogger written for fun, not evil.
☆16Updated 7 years ago
Alternatives and similar repositories for kernel-based-keylogger-for-Linux
Users that are interested in kernel-based-keylogger-for-Linux are comparing it to the libraries listed below
Sorting:
- Trojan downloader simple virus☆16Updated 7 years ago
- Working exploit code for CVE-2019-17625☆19Updated 5 years ago
- Monitor the textual data pasted into Windows clipboard☆29Updated 7 years ago
- LEMPO (Ldap Exposure on POrtainer) is an exploit for CVE-2018-19466 (LDAP Credentials Disclosure on Portainer). Featured @ DevFest Siberi…☆11Updated 5 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Updated 9 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Updated 7 years ago
- Monitor Files and Folders for Changes in Real Time .☆11Updated 7 years ago
- ImperiumRAT is an advanced remote administration tool with features like (Remote desktop, Disable CMD, Turn on/off webcam, and more!)☆12Updated 3 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 3 years ago
- Installs And Executes Shellcode☆11Updated 10 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Updated 7 years ago
- PoC showing how a potentially malicious script could be hidden, encrypted, into invisible unicode characters☆14Updated 6 years ago
- jgraphx 4.0.4 build for cs project☆22Updated 5 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 8 years ago
- CVE-2020-5837 exploit☆43Updated 5 years ago
- Backdoor for Windows systems (client and server) writen in C (client) and ASM (server) using reverse connection☆19Updated 11 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 7 years ago
- Simple, lightweight and compact key logger written for fun ...☆17Updated 7 years ago
- ☆21Updated 6 years ago
- This repository contains some details about abusing outlook.☆27Updated 7 years ago
- create customized .onion addresses for your hidden service,make shallot and eschalot tools☆13Updated 4 years ago
- ☆14Updated 6 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆45Updated 6 years ago
- Encrypted Shellcode Loader Generator☆22Updated 7 years ago
- ☆17Updated 7 years ago
- VNC pentest tool with bruteforce and ducky script execution features☆24Updated 8 years ago
- CVE-2019-0708 - BlueKeep (RDP)☆40Updated 5 years ago
- A Linux RAT in C☆33Updated 7 years ago
- Hide .Net assembly into png images☆36Updated 6 years ago
- C# implementation of Out-Minidump.ps1☆10Updated 7 years ago