MattiaAlessi / phantom-keyloggerView external linksLinks
Phantom Keylogger is an advanced, stealth-enabled keystroke and visual intelligence gathering system.
☆74Dec 10, 2025Updated 2 months ago
Alternatives and similar repositories for phantom-keylogger
Users that are interested in phantom-keylogger are comparing it to the libraries listed below
Sorting:
- takes shellcode bad-bytes and banishes them, returning cleaned shellcode with preserved functionalities☆57Updated this week
- Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum…☆17Jun 12, 2025Updated 8 months ago
- A self-hosted, real-time collaborative workspace for offensive security assessments.☆36Jan 27, 2026Updated 2 weeks ago
- Dynamic Indirect Syscalls via JOP/ROP in Pure no_std, no_alloc, no dependency Rust☆43Aug 6, 2025Updated 6 months ago
- 🛡️ Detect and respond to security threats in real-time with God-Eye, an AI-driven tool designed for privacy and local deployment on mult…☆38Updated this week
- A Very Cool Process Injector That supports both Shellcode injection and dll injection☆23Sep 22, 2025Updated 4 months ago
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆29Nov 27, 2025Updated 2 months ago
- Patches the AmsiScan function in clr.dll allowing for unrestricted assembly loading in .NET☆50May 5, 2025Updated 9 months ago
- Windows Access token manipulation tool made in C#☆24Aug 24, 2025Updated 5 months ago
- One-header configurable C++20 COFF loader☆21Jul 21, 2025Updated 6 months ago
- Real-time chat without using Javascript.☆18Feb 7, 2018Updated 8 years ago
- PandaCrypter is a C#-based tool designed to convert PowerShell scripts into obfuscated batch files (.bat) with encryption and additional …☆43Aug 16, 2025Updated 5 months ago
- A PoC to deploy a Sliver Agent with amsi bypass, process injection, hollowing and OpSec☆27Oct 2, 2024Updated last year
- Open Source Implementation of Cobalt Strike's Malleable C2☆92Jan 27, 2026Updated 2 weeks ago
- Modern PIC implant for Windows (64 & 32 bit)☆105Jul 23, 2025Updated 6 months ago
- Guide on using the PPPwnGo GUI tool☆11Sep 26, 2024Updated last year
- ☆48Oct 14, 2025Updated 4 months ago
- ☆35Feb 1, 2026Updated last week
- Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)☆69May 31, 2025Updated 8 months ago
- Indirect-Shellcode-Executor expoits the miss-configuration/vulnerability present on the API Windows method ReadProcessMemory discovered b…☆82Nov 15, 2025Updated 2 months ago
- A portable C# utility for enumerating local and remote windows sessions☆55Jan 1, 2026Updated last month
- Command Augmentation support for BOFs and .NET assemblies across agents☆38Jan 12, 2026Updated last month
- Version 2 of the Rhythm Randomizer project☆13Jan 6, 2023Updated 3 years ago
- A high-fidelity x86_64 polymorphic mutation engine focused on instruction-level fragmentation and context preservation.☆109Jan 18, 2026Updated 3 weeks ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆51May 16, 2025Updated 8 months ago
- Documentation, U-Boot and OpenWRT ports for a low-cost MT02 repeater.☆14Oct 27, 2025Updated 3 months ago
- Detect Stalkers with Wardriving, using Python☆46Aug 4, 2023Updated 2 years ago
- Go ransomware utilising ChaCha20 and ECIES encryption.☆65Jul 3, 2024Updated last year
- Beacon Object Files (BOFs) for Cobalt Strike and Havoc C2. Implementations of Active Directory attacks and post-exploitation techniques.☆99Jan 26, 2026Updated 2 weeks ago
- This C# tool sprays for admin access over the entire domain☆87Dec 7, 2025Updated 2 months ago
- A small script to automate project folder management and basic tool output☆34May 14, 2020Updated 5 years ago
- Title is self explaining, well theres few methods we can do to read locked file and play with it...☆87Jan 5, 2026Updated last month
- ☆115Dec 11, 2025Updated 2 months ago
- Automated pipeline for downloading, staging, ingesting, and investigating leaked and declassified archives (DDoSecrets, National Security…☆31Sep 22, 2025Updated 4 months ago
- ATL.dll and WmiMgmt.msc UAC Bypass☆12Apr 26, 2025Updated 9 months ago
- A backdoor is a tool used to gain remote access to a machine. Typically, backdoor utilities such as NetCat have 2 main functions: to pip…☆13Apr 26, 2021Updated 4 years ago
- ☆51Jul 8, 2025Updated 7 months ago
- An NPU-accelerated chatbot running via AnythingLLM☆16Jul 3, 2025Updated 7 months ago
- Monte Carlo password checking☆11Aug 14, 2017Updated 8 years ago