AnonsecPhilippines / ASH-KeyloggerView external linksLinks
A simple keylogger application for XSS attack.
☆16Aug 13, 2017Updated 8 years ago
Alternatives and similar repositories for ASH-Keylogger
Users that are interested in ASH-Keylogger are comparing it to the libraries listed below
Sorting:
- Plog - A simple and powerful keylogger !☆11Jun 28, 2018Updated 7 years ago
- HTTP Proxy using Amazon Lambda for source IP cycling☆15Apr 6, 2021Updated 4 years ago
- Spawns a reverse TCP shell on the machine its run on☆15Mar 29, 2014Updated 11 years ago
- A simple .NET renaming Obfuscator☆14Nov 20, 2020Updated 5 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Jan 11, 2015Updated 11 years ago
- Joomla User-Agent/X-Forwarded-For RCE☆17Feb 5, 2016Updated 10 years ago
- ☆25Jul 5, 2018Updated 7 years ago
- Checks for PATH substitution vulnerabilities and logs the commands executed by the vulnerable executables☆51Sep 27, 2016Updated 9 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Sep 2, 2014Updated 11 years ago
- Remote PE reflective injection with a simple reflective loader☆32Jun 28, 2019Updated 6 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆26May 1, 2017Updated 8 years ago
- PowerShell Reverse HTTPs Shell☆29Nov 14, 2014Updated 11 years ago
- wyReferee - referee client for osu!☆12Jan 15, 2026Updated 3 weeks ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆199Nov 19, 2017Updated 8 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Verification tools for CVE-2016-1287☆33Mar 15, 2017Updated 8 years ago
- Bypass AMSI and Defender using Ordinal Values☆41Apr 15, 2020Updated 5 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆70Aug 19, 2020Updated 5 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- An open-source script and place collection to be used in Roblox games. These are not exploits, they are for development☆15Apr 30, 2022Updated 3 years ago
- An open-source, automated, lecture recording system that tracks the presenter in 4K video streams☆12Sep 24, 2018Updated 7 years ago
- AW4C verification server☆17Jun 15, 2023Updated 2 years ago
- ☆14Oct 23, 2025Updated 3 months ago
- Bloxstrap integration that brings back ability to use multiple instances of Roblox.☆11Mar 31, 2025Updated 10 months ago
- Scutex is a .Net licensing system built on top of WPF and WCF and .Net 4☆16Aug 8, 2012Updated 13 years ago
- Linux integrity monitoring for CentOS/RHEL☆10May 13, 2020Updated 5 years ago
- Generic methods for retrying functions and actions in .NET☆10Oct 28, 2019Updated 6 years ago
- Examine HTTP response headers for common security issues☆38Jun 7, 2022Updated 3 years ago
- OpenCV based IDN option generator PoC☆39Jan 18, 2017Updated 9 years ago
- 🔮 [C#] Source code randomizer and compiler☆42Jun 28, 2017Updated 8 years ago
- A simple javascript game engine on Android platform based on v8 and openGL ES 2.0☆11Jun 14, 2018Updated 7 years ago
- It's a simple Web App written in PHP and MySQL as a backend to manage visitor register with advance feature of auto picture generator☆14Jul 7, 2017Updated 8 years ago
- Process Hollowing☆12Sep 13, 2017Updated 8 years ago
- SharpSploit is a .NET post-exploitation library written in C#☆16Apr 6, 2020Updated 5 years ago
- Injection of MSIL using Cecil☆12Jul 28, 2015Updated 10 years ago
- osu! pp and difficulty calculator, pure java implementation of https://github.com/Francesco149/oppai-ng☆12Mar 5, 2021Updated 4 years ago
- A C# DLL Wrapper Generator☆11Feb 23, 2022Updated 3 years ago
- A Powershell script for signing or adding signatures to tap-windows6 drivers☆10Apr 18, 2019Updated 6 years ago
- The evolution of NxRansomware☆11Jun 14, 2019Updated 6 years ago