EvilBytecode / Keylogger
Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.
☆22Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for Keylogger
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆38Updated 5 months ago
- Go ransomware utilising ChaCha20 and ECIES encryption.☆57Updated last month
- Cerez 😈 LD_PRELOAD rootkit☆22Updated last year
- This is a working variant of the Mirai IOT botnet☆13Updated last year
- Ransomware written in go, encrypt - decrypt.☆15Updated 4 months ago
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆10Updated 4 months ago
- A C2 framework built for my bachelors thesis☆53Updated 3 weeks ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated last year
- LNK-Dropper Builder☆16Updated 2 months ago
- Create a malicious pip package (PoC)☆10Updated last year
- A malicous Golang Package☆10Updated 4 months ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆12Updated 6 months ago
- Crypter/Stub/Downloader for payloads and malware, bypassing all AV and achiving a score of 0/60 detections on virus total☆9Updated 7 months ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆31Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆51Updated 4 months ago
- RegStrike is a .reg payload generator☆57Updated last year
- This is a simulation of attack by the Cozy Bear group (APT-29) targeting diplomatic missions☆25Updated 5 months ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆15Updated last year
- Parent Process ID Spoofing, coded in CGo.☆21Updated 4 months ago
- Unhook Ntdll.dll, Go & C++.☆14Updated 4 months ago
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆35Updated 2 months ago
- ☆37Updated 3 weeks ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆39Updated 5 months ago
- CVE-2023-38389 < Wordpress < JupiterX Core < Unauthenticated Account Takeover☆27Updated 3 months ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆63Updated 6 months ago
- PowerShell script to generate ShellCode in various formats☆39Updated last month
- Tool to retrieve Config from Redline C2 servers☆16Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆52Updated 9 months ago