AlirezaChegini / kernel-based-keylogger-for-LinuxLinks
A simplex kernel-based keylogger written for fun, not evil.
☆16Updated 7 years ago
Alternatives and similar repositories for kernel-based-keylogger-for-Linux
Users that are interested in kernel-based-keylogger-for-Linux are comparing it to the libraries listed below
Sorting:
- PoC: process watcher patterns to make killing a process hard.☆11Updated 7 years ago
- Monitor the textual data pasted into Windows clipboard☆29Updated 6 years ago
- Trojan downloader simple virus☆16Updated 6 years ago
- LEMPO (Ldap Exposure on POrtainer) is an exploit for CVE-2018-19466 (LDAP Credentials Disclosure on Portainer). Featured @ DevFest Siberi…☆11Updated 5 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Updated 7 years ago
- Installs And Executes Shellcode☆11Updated 10 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 7 years ago
- Monitor Files and Folders for Changes in Real Time .☆10Updated 6 years ago
- Hide .Net assembly into png images☆36Updated 6 years ago
- jgraphx 4.0.4 build for cs project☆22Updated 4 years ago
- C# code for Transferring Backdoor Payloads by ARP Traffic and Bypassing Anti-viruses (Slow)☆45Updated 2 years ago
- ☆17Updated 7 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Updated 9 years ago
- ImperiumRAT is an advanced remote administration tool with features like (Remote desktop, Disable CMD, Turn on/off webcam, and more!)☆12Updated 2 years ago
- Working exploit code for CVE-2019-17625☆18Updated 5 years ago
- Simple, lightweight and compact key logger written for fun ...☆17Updated 6 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 8 years ago
- Password reader for Mozilla Firefox and Thunderbird☆23Updated 5 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19Updated 5 years ago
- An example in C# for programmatically calling UAC to escalate to admin☆14Updated 7 years ago
- ☆14Updated 5 years ago
- create customized .onion addresses for your hidden service,make shallot and eschalot tools☆13Updated 3 years ago
- Minimalist Custom .NET Core Garbage Collector☆22Updated 5 years ago
- Jar Protector - Jar Crypter☆14Updated 7 years ago
- UIAccess UAC Bypass using token duplication and keyboard events☆27Updated 5 years ago
- C# AV bypass jank☆33Updated 4 years ago
- A Linux RAT in C☆35Updated 6 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆46Updated 5 years ago
- This repository contains some details about abusing outlook.☆27Updated 7 years ago