Remote persistent πLogger for Windows and Linux
β295Apr 21, 2023Updated 2 years ago
Alternatives and similar repositories for KLogger
Users that are interested in KLogger are comparing it to the libraries listed below
Sorting:
- The SteaLinG is an open-source penetration testing framework designed for social engineeringβ244Jul 3, 2024Updated last year
- steal chrome saved passwords "undetectable"β51Mar 15, 2022Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Frameworkβ22Jun 11, 2022Updated 3 years ago
- WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.β281Feb 24, 2025Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pagβ¦β116Jul 18, 2023Updated 2 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionalityβ50Feb 12, 2023Updated 3 years ago
- MacroExploit use in excel sheetβ20Jun 12, 2023Updated 2 years ago
- Retrieve AD accounts description and search for password in itβ82Jul 21, 2022Updated 3 years ago
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persistβ¦β91Jul 26, 2024Updated last year
- Only for educational purposesβ12Jun 17, 2023Updated 2 years ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defenderβ23Nov 20, 2022Updated 3 years ago
- Command & Control-Framework created for collaboration in python3β322Aug 7, 2023Updated 2 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movementβ369Dec 24, 2021Updated 4 years ago
- Generate Undetectable Metasploit Payload in a simple wayβ37Dec 19, 2023Updated 2 years ago
- Sandman is a NTP based backdoor for hardened networks.β815Mar 31, 2024Updated last year
- Infect Shared Files In Memory for Lateral Movementβ193Dec 14, 2022Updated 3 years ago
- A Red Teaming tool focused on profiling the target.β29Jan 10, 2026Updated last month
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercerβ738May 19, 2023Updated 2 years ago
- Remote persistent keylogger for Windows and Linux..β12Aug 21, 2022Updated 3 years ago
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.β783Jun 23, 2023Updated 2 years ago
- A curated list wordlists for bruteforcing and fuzzingβ85Apr 3, 2023Updated 2 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environmentsβ89Jun 22, 2024Updated last year
- Bash script for CTF automating basic enumerationβ41Mar 1, 2022Updated 3 years ago
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 frameworkβ389Jul 30, 2024Updated last year
- β138Apr 20, 2023Updated 2 years ago
- Repository contains psexec, which will help to exploit the forgotten pipeβ172Nov 5, 2024Updated last year
- This is a Burp Suite extension that allows users to easily add web addresses to the Burp Suite scope.β97Jan 2, 2025Updated last year
- This is a shell script that creates an SSH backdoor on an iPhone.β225Jan 7, 2026Updated last month
- A Python script to exploit CVE-2022-36446 Software Package Updates RCE (Authenticated) on Webmin < 1.997.β116Jan 31, 2025Updated last year
- HVNC for Cobalt Strikeβ1,298Dec 7, 2023Updated 2 years ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.β550Jul 16, 2021Updated 4 years ago
- Script for generating revshellsβ478Sep 10, 2024Updated last year
- Credential Guard Bypass Via Patching Wdigest Memoryβ335Feb 3, 2023Updated 3 years ago
- β38Apr 7, 2023Updated 2 years ago
- A simple pentest container equipped with common python pentest tools.β42Jan 30, 2026Updated 3 weeks ago
- E4GL30S1NT - Simple Information Gathering Toolβ664Jun 8, 2025Updated 8 months ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.β348Oct 22, 2024Updated last year
- The BackDoor of HIPHP gives you the power to control websites based on PHP using HTTP/HTTPS protocol. By sending files, tokens and commanβ¦β215Feb 10, 2026Updated 2 weeks ago
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanismβ¦β23Nov 24, 2025Updated 3 months ago