HiDoYa / linux-secretive-keyloggerLinks
Linux kernel level keylogger that uses Twitter as a covert channel to get information of keystrokes and user data into the attacker using steganography.
☆11Updated 3 years ago
Alternatives and similar repositories for linux-secretive-keylogger
Users that are interested in linux-secretive-keylogger are comparing it to the libraries listed below
Sorting:
- PhishLog is a penetration testing and red teaming tool that automates the setup of a live keylogger that could be used with phishing camp…☆30Updated 6 years ago
- Extract Silently WiFi Passwords By Mail & USB☆19Updated 4 years ago
- Reverse shell using Windows Registry files (.reg)☆17Updated 5 years ago
- first program python to steal password microsoft edge all version browser, send info to email☆13Updated 5 years ago
- Repository of tools used in my blog☆51Updated last year
- Miscellaneous exploit code☆21Updated 9 years ago
- Just a quick'n'dirty tool to parse leaked databases (csv-like or sql format)☆23Updated 8 years ago
- Agent Tesla Spyware C2 Exploit [PATCHED]☆32Updated 7 years ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Updated 5 years ago
- Payload delivery via URL and some social engineering.☆17Updated last year
- Malicious Software SRC Extract☆32Updated 3 years ago
- It is a tool that brings together exploits and news about security and vulnerabilities, with the intention of contributing to the open so…☆66Updated 7 years ago
- Secure destruction of sensitive virtual data, temporary files and swap partitions☆77Updated 3 years ago
- ☆53Updated 4 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Updated 5 years ago
- (Windows/Linux/Mac) Remote Administration Tool☆66Updated 4 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆35Updated 3 years ago
- Warning, almost everything in this Repo is MALWARE. I am using this to experiment with various functionality for the Hak5 USB Rubber Duck…☆28Updated 8 years ago
- Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3☆12Updated 4 years ago
- Python RAT with reverse connection and asymmetric encrypted communications☆15Updated 5 years ago
- Keylogger for ethical hackers☆13Updated 4 years ago
- pen testing scripts☆12Updated 5 years ago
- Zero-Day Vulnerability in File Manager Plugin 6.7 ( CVE 2020-25213 )☆12Updated 2 years ago
- Fully Undetectable telegram Rat dropper☆35Updated 5 years ago
- Sourcecode of Infostealer.Dexter POS Malware and C&C☆49Updated 9 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆17Updated 5 years ago
- Android Crypter/Decrypter App Generator☆52Updated 7 years ago
- Usage of WH-HackerExploit Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsibility …☆38Updated 3 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆54Updated 4 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 6 years ago