A simple keylogger application for XSS attack.
☆16Aug 13, 2017Updated 8 years ago
Alternatives and similar repositories for ASH-Keylogger
Users that are interested in ASH-Keylogger are comparing it to the libraries listed below
Sorting:
- Plog - A simple and powerful keylogger !☆11Jun 28, 2018Updated 7 years ago
- Spawns a reverse TCP shell on the machine its run on☆15Mar 29, 2014Updated 11 years ago
- HTTP Proxy using Amazon Lambda for source IP cycling☆15Apr 6, 2021Updated 4 years ago
- A simple .NET renaming Obfuscator☆14Nov 20, 2020Updated 5 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Jan 11, 2015Updated 11 years ago
- Joomla User-Agent/X-Forwarded-For RCE☆17Feb 5, 2016Updated 10 years ago
- ☆25Jul 5, 2018Updated 7 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Sep 2, 2014Updated 11 years ago
- Checks for PATH substitution vulnerabilities and logs the commands executed by the vulnerable executables☆51Sep 27, 2016Updated 9 years ago
- a javascript keylogger included in a gif file☆39Aug 8, 2025Updated 6 months ago
- Remote PE reflective injection with a simple reflective loader☆32Jun 28, 2019Updated 6 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆26May 1, 2017Updated 8 years ago
- wyReferee - referee client for osu!☆12Jan 15, 2026Updated last month
- PowerShell Reverse HTTPs Shell☆30Nov 14, 2014Updated 11 years ago
- Cronbased Dirty Cow Exploit☆30Jan 30, 2017Updated 9 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆200Nov 19, 2017Updated 8 years ago
- Verification tools for CVE-2016-1287☆33Mar 15, 2017Updated 8 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆70Aug 19, 2020Updated 5 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- AW4C verification server☆17Jun 15, 2023Updated 2 years ago
- Bloxstrap integration that brings back ability to use multiple instances of Roblox.☆11Mar 31, 2025Updated 11 months ago
- Generic methods for retrying functions and actions in .NET☆10Oct 28, 2019Updated 6 years ago
- Scutex is a .Net licensing system built on top of WPF and WCF and .Net 4☆16Aug 8, 2012Updated 13 years ago
- Linux integrity monitoring for CentOS/RHEL☆12May 13, 2020Updated 5 years ago
- An open-source, automated, lecture recording system that tracks the presenter in 4K video streams☆12Sep 24, 2018Updated 7 years ago
- ☆14Oct 23, 2025Updated 4 months ago
- An open-source script and place collection to be used in Roblox games. These are not exploits, they are for development☆15Apr 30, 2022Updated 3 years ago
- Examine HTTP response headers for common security issues☆38Jun 7, 2022Updated 3 years ago
- OpenCV based IDN option generator PoC☆39Jan 18, 2017Updated 9 years ago
- 🔮 [C#] Source code randomizer and compiler☆42Jun 28, 2017Updated 8 years ago
- Independent file type identification python library☆12Mar 16, 2023Updated 2 years ago
- A NodeJS application to upload, watch and stream live videos.☆12Jan 24, 2023Updated 3 years ago
- ScriptLab is a Paint.NET effect plugin to automate other effects and adjustments☆10Sep 10, 2021Updated 4 years ago
- ☆10Aug 16, 2019Updated 6 years ago
- Xcode required macOS version☆16Dec 10, 2022Updated 3 years ago
- macOS/OSX hash dump script taken from Empire framework☆13Oct 19, 2018Updated 7 years ago
- A C# DLL Wrapper Generator☆11Feb 23, 2022Updated 4 years ago
- A PowerShell script to automatically configure for the highest privacy and control settings in Windows 10.☆10Aug 16, 2024Updated last year