Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.
☆276Jun 16, 2024Updated last year
Alternatives and similar repositories for DNS-Tunnel-Keylogger
Users that are interested in DNS-Tunnel-Keylogger are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆570Mar 28, 2024Updated 2 years ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆375Apr 6, 2024Updated 2 years ago
- A Powerful Network Reconnaissance Tool for Security Professionals☆107Dec 29, 2024Updated last year
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆116Jul 17, 2024Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆154May 3, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Execute shellcode files with rundll32☆219Jan 28, 2024Updated 2 years ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆80Apr 7, 2026Updated last month
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,446Apr 9, 2026Updated last month
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆292May 27, 2024Updated last year
- Simulate the behavior of AV/EDR for malware development training.☆567Feb 15, 2024Updated 2 years ago
- Inject DLLs into the explorer process using icons☆408May 18, 2025Updated 11 months ago
- ☆168Feb 29, 2024Updated 2 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆34Sep 15, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Microsoft Graph API post-exploitation toolkit☆95Jul 13, 2024Updated last year
- Yet Another Mac Changer!!!☆12Jan 26, 2023Updated 3 years ago
- Local & remote Windows DLL Proxying☆174Jun 17, 2024Updated last year
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆85Jan 12, 2023Updated 3 years ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆102Mar 27, 2025Updated last year
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆397Jan 20, 2026Updated 3 months ago
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆170May 30, 2024Updated last year
- Various one-off pentesting projects written in Nim. Updates happen on a whim.☆159Jul 14, 2025Updated 9 months ago
- ☆307Mar 15, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆130Dec 23, 2025Updated 4 months ago
- ☆91May 15, 2024Updated last year
- ☆84May 19, 2024Updated last year
- 📡 802.11 broadcast analyzer & injector☆174Jun 17, 2025Updated 10 months ago
- A Slack bot phishing framework for Red Teaming exercises☆165Apr 27, 2024Updated 2 years ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Dec 7, 2019Updated 6 years ago
- Secutils.dev is an open-source, versatile, yet simple security toolbox for engineers and researchers☆101May 2, 2026Updated last week
- Real fucking shellcode encryptor & obfuscator tool☆1,024Jan 7, 2026Updated 4 months ago
- ApexLdr is a DLL Payload Loader written in C☆117Jul 17, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆42Oct 18, 2023Updated 2 years ago
- ☆121Jan 30, 2024Updated 2 years ago
- Source code and examples for PassiveAggression☆64Jun 6, 2024Updated last year
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.☆251Jun 11, 2024Updated last year
- An interactive shell to spoof some LOLBins command line☆187Jan 27, 2024Updated 2 years ago
- Terminate AV/EDR Processes using kernel driver☆354Jun 12, 2023Updated 2 years ago
- Use ESC1 to perform a makeshift DCSync and dump hashes☆210Nov 2, 2023Updated 2 years ago