Phantom Keylogger is an advanced, stealth-enabled keystroke and visual intelligence gathering system.
☆75Dec 10, 2025Updated 2 months ago
Alternatives and similar repositories for phantom-keylogger
Users that are interested in phantom-keylogger are comparing it to the libraries listed below
Sorting:
- takes shellcode bad-bytes and banishes them, returning cleaned shellcode with preserved functionalities☆58Updated this week
- Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum…☆17Jun 12, 2025Updated 8 months ago
- Burpsuite Extension for Jsmon☆22Feb 5, 2026Updated last month
- A self-hosted, real-time collaborative workspace for offensive security assessments.☆41Feb 20, 2026Updated 2 weeks ago
- Thats it! An Open-Source Windows UEFI Rootkit☆28Jul 19, 2025Updated 7 months ago
- Dynamic Indirect Syscalls via JOP/ROP in Pure no_std, no_alloc, no dependency Rust☆43Aug 6, 2025Updated 7 months ago
- 🛡️ Detect and respond to security threats in real-time with God-Eye, an AI-driven tool designed for privacy and local deployment on mult…☆38Updated this week
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆29Feb 15, 2026Updated 2 weeks ago
- Patches the AmsiScan function in clr.dll allowing for unrestricted assembly loading in .NET☆51May 5, 2025Updated 10 months ago
- Windows Access token manipulation tool made in C#☆24Aug 24, 2025Updated 6 months ago
- One-header configurable C++20 COFF loader☆21Jul 21, 2025Updated 7 months ago
- Real-time chat without using Javascript.☆18Feb 7, 2018Updated 8 years ago
- PandaCrypter is a C#-based tool designed to convert PowerShell scripts into obfuscated batch files (.bat) with encryption and additional …☆46Aug 16, 2025Updated 6 months ago
- A PoC to deploy a Sliver Agent with amsi bypass, process injection, hollowing and OpSec☆29Oct 2, 2024Updated last year
- Open Source Implementation of Cobalt Strike's Malleable C2☆94Jan 27, 2026Updated last month
- Guide on using the PPPwnGo GUI tool☆11Sep 26, 2024Updated last year
- ☆48Oct 14, 2025Updated 4 months ago
- Prevent in-process process termination by patching exit APIs☆63Nov 9, 2025Updated 3 months ago
- Satanic Crypter A powerful tool designed to convert EXE files into BAT files with advanced features and a modern GUI interface.☆11Jan 4, 2025Updated last year
- ☆35Feb 1, 2026Updated last month
- Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)☆68May 31, 2025Updated 9 months ago
- Indirect-Shellcode-Executor expoits the miss-configuration/vulnerability present on the API Windows method ReadProcessMemory discovered b…☆83Nov 15, 2025Updated 3 months ago
- Material For Malware Analysis Fundamentals Workshop By Eslam Abbas "Mr Robot"☆23Oct 9, 2025Updated 4 months ago
- A portable C# utility for enumerating local and remote windows sessions☆56Jan 1, 2026Updated 2 months ago
- Documentation, U-Boot and OpenWRT ports for a low-cost MT02 repeater.☆14Oct 27, 2025Updated 4 months ago
- A high-fidelity x86_64 polymorphic mutation engine focused on instruction-level fragmentation and context preservation.☆111Jan 18, 2026Updated last month
- Version 2 of the Rhythm Randomizer project☆13Jan 6, 2023Updated 3 years ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆52May 16, 2025Updated 9 months ago
- KitsuneC2 is a cross-platform adversary emulation tool written in Go.☆12Oct 25, 2024Updated last year
- Go ransomware utilising ChaCha20 and ECIES encryption.☆66Jul 3, 2024Updated last year
- Command Augmentation support for BOFs and .NET assemblies across agents☆40Feb 17, 2026Updated 2 weeks ago
- Detect Stalkers with Wardriving, using Python☆47Aug 4, 2023Updated 2 years ago
- This C# tool sprays for admin access over the entire domain☆88Dec 7, 2025Updated 2 months ago
- A small script to automate project folder management and basic tool output☆34May 14, 2020Updated 5 years ago
- Beacon Object Files (BOFs) for Cobalt Strike and Havoc C2. Implementations of Active Directory attacks and post-exploitation techniques.☆101Jan 26, 2026Updated last month
- ☆14May 14, 2022Updated 3 years ago
- Dark Blue is a set of tools designed to help teams better prepare for CyberPatriot competition rounds by trying to make it easy to create…☆16Jul 30, 2022Updated 3 years ago
- Operating System: CPU Scheduling Algorithms☆10Aug 18, 2020Updated 5 years ago
- Discord RAT made in powershell (open source)☆13Jul 16, 2025Updated 7 months ago