Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.
☆28Apr 21, 2025Updated 10 months ago
Alternatives and similar repositories for Keylogger
Users that are interested in Keylogger are comparing it to the libraries listed below
Sorting:
- A malicous Golang Package☆15Apr 21, 2025Updated 10 months ago
- Kill malawarebytes process. Can be ported to any programming language.☆12Apr 21, 2025Updated 10 months ago
- Parent Process ID Spoofing, coded in CGo.☆24Apr 21, 2025Updated 10 months ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆61Apr 27, 2025Updated 10 months ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Apr 21, 2025Updated 10 months ago
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆15Apr 21, 2025Updated 10 months ago
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆15Apr 21, 2025Updated 10 months ago
- VBS-Obfuscator-GO is a Go-based tool designed for obfuscating VBScript (VBS) files. It transforms readable VBScript code into a less reco…☆38Apr 21, 2025Updated 10 months ago
- A mutliple tactics to execute shellcode in go :}☆23Apr 21, 2025Updated 10 months ago
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆51May 22, 2025Updated 9 months ago
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆139Apr 27, 2025Updated 10 months ago
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆19May 8, 2025Updated 9 months ago
- Eset-Unload is a C++ tool that interacts with a process's loaded modules to identify and unload the ebehmoni.dll module, typically found …☆12Apr 21, 2025Updated 10 months ago
- Spoof the return address of any function call.☆11Jul 21, 2024Updated last year
- golang decryption poc of the new app bound encryption introduced in chrome version 127.☆22Nov 4, 2024Updated last year
- Measures average CPU cycles for the CPUID instruction to detect if the code is running in a VM by comparing against a threshold.☆21Apr 21, 2025Updated 10 months ago
- A Free Open sourced crypter that builds a output .NET .exe Stub (Updated whenever I feel like it)☆19Oct 18, 2025Updated 4 months ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆26Apr 21, 2025Updated 10 months ago
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Sep 27, 2024Updated last year
- Shellcode encoder&loader written in Go language, which can encrypt binary or PE files. It offers a variety of complex encryption algorith…☆20May 24, 2024Updated last year
- Project Evoli. PyPi Extention for Creating Loggers,Grabbers and Rats☆20Jul 6, 2023Updated 2 years ago
- Bypassing Major EDR's with staged shellcode, custom getmodulehandleW and getprocaddress, veh syscalls & more.☆26Apr 21, 2025Updated 10 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆103Apr 27, 2025Updated 10 months ago
- This tool will listen on a given port, strip SSL encryption, forward traffic through a plain TCP proxy, then encrypt the returning traffi…☆31Oct 18, 2021Updated 4 years ago
- Linux 持久化工具:自动检测可持久化方式,目前支持ssh及crab持久化,无需依赖开箱即用☆25Oct 29, 2024Updated last year
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Apr 4, 2023Updated 2 years ago
- extract chromium-based browser's cookies using chrome's remote debugging without admin rights☆22Nov 3, 2024Updated last year
- Open-source Discord RAT (Remote Access Trojan) controlled directly from your own server.☆12Nov 24, 2024Updated last year
- Ransomware written in go, encrypt - decrypt.☆30Apr 27, 2025Updated 10 months ago
- Generate wordlists for dictionary attacks☆34Mar 14, 2025Updated 11 months ago
- Preventing 3rd Party DLLs from Injecting into your Malware☆25Aug 31, 2021Updated 4 years ago
- AI 生成☆46Jul 30, 2025Updated 6 months ago
- 免杀计划任务进行权限维持,过主流杀软。 A schtask tool bypass anti-virus☆73Nov 6, 2022Updated 3 years ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆86Sep 14, 2024Updated last year
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Jul 27, 2022Updated 3 years ago
- ☆11Feb 28, 2022Updated 3 years ago
- Passive Web Vulnerability Detection Tool☆37May 5, 2025Updated 9 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆92Apr 27, 2025Updated 10 months ago
- A YARA rule generator☆62Feb 8, 2026Updated 2 weeks ago