Cyral / CSS-KeyloggerLinks
CSS Keylogger Proof of Concept
☆14Updated 7 years ago
Alternatives and similar repositories for CSS-Keylogger
Users that are interested in CSS-Keylogger are comparing it to the libraries listed below
Sorting:
- unix SSH post-exploitation 1337 tool☆142Updated 7 years ago
- Turn a normal PDF file into malicious.Use to steal Net-NTLM Hashes from windows machines.☆350Updated 4 years ago
- Script to identify hosts vulnerable to CVE-2018-10933☆232Updated 7 years ago
- Script to automate PUT HTTP method exploitation to get shell☆125Updated 5 years ago
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆314Updated 7 years ago
- A keystroke logger to exploit XSS vulnerabilities in a site - for my personal Educational purposes only☆172Updated 4 years ago
- Tool to deploy a post-exploitation prompt at any time☆320Updated 4 years ago
- Fuzzbunch deployment for Debian - Intructions: Readme.md☆142Updated 3 months ago
- A tool to generate obfuscated one liners to aid in penetration testing☆180Updated 7 years ago
- Pip install exploit package☆157Updated 7 years ago
- Hunt Open MongoDB instances☆79Updated 6 years ago
- IP obfuscator made to make a malicious ip a bit cuter☆548Updated last year
- A little post-exploit tool that carefully clean *NIX access logs☆121Updated 7 years ago
- ☆120Updated 6 years ago
- Script to steal passwords from ssh.☆488Updated 7 years ago
- An implementation of NSA's ExplodingCan exploit in Python☆269Updated 8 years ago
- Simple python backdoor with Ngrok tunnel support☆207Updated 2 years ago
- ☆208Updated 4 years ago
- Freedom Fighting Mode: open source hacking harness☆345Updated last year
- Search Exploitable Software on Linux☆234Updated 2 years ago
- Common password pattern generator using strings list☆131Updated 5 years ago
- Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution☆394Updated 8 years ago
- This script will create a POC that will steal NTML hashes from a remote computer. Do not use this for illegal purposes.The author does no…☆252Updated 2 years ago
- Penetration testing scripts☆145Updated 7 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆169Updated 6 years ago
- Execute a brute force attack with Steghide to file with hide information and password established☆121Updated 5 years ago
- A stealthy Python based Windows backdoor that uses Github as a command and control server☆266Updated 8 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Updated 4 years ago
- A WebSocket C2 Tool☆410Updated 8 years ago
- Scripts that are useful for me on pen tests☆537Updated 3 years ago