MojtabaTajik / FunnyKeyloggerLinks
Simple, lightweight and compact key logger written for fun ...
☆17Updated 6 years ago
Alternatives and similar repositories for FunnyKeylogger
Users that are interested in FunnyKeylogger are comparing it to the libraries listed below
Sorting:
- A host based IDS written in C# Targetted at Metasploit☆44Updated 11 years ago
- Tool designed to study the answers of your DNS resolver and make easier the identification of techniques such as DNS Hijacking/Poisoning☆27Updated 6 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Updated 6 years ago
- Monitor the textual data pasted into Windows clipboard☆28Updated 6 years ago
- Proof of concept demo for a tool that listens for keywords, and records audio to a file.☆12Updated 8 years ago
- A simplex kernel-based keylogger written for fun, not evil.☆16Updated 7 years ago
- Hide .Net assembly into png images☆36Updated 5 years ago
- A simple AES malware crypter☆16Updated 7 years ago
- An example in C# for programmatically calling UAC to escalate to admin☆14Updated 6 years ago
- C# code for Transferring Backdoor Payloads by ARP Traffic and Bypassing Anti-viruses (Slow)☆44Updated 2 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Updated 6 years ago
- Inject Frida-Gadget into a local process☆26Updated 5 years ago
- Discover MSSQL Instances via UDP Scanning☆25Updated 6 years ago
- Automate AV evasion by calling AMSI☆88Updated 2 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Updated 4 years ago
- Installs And Executes Shellcode☆11Updated 9 years ago
- Bind shell that uses Named Pipes as transport and execute PowerShell code through Runspaces.☆16Updated 5 years ago
- C# Situational Awareness Script☆34Updated 6 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆16Updated 7 years ago
- Jar Protector - Jar Crypter☆14Updated 7 years ago
- Password reader for Mozilla Firefox and Thunderbird☆23Updated 5 years ago
- Apfell POC Chrome Extension Payload☆10Updated 5 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆46Updated 5 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆25Updated 5 years ago
- Miscellaneous exploit scripts☆17Updated 3 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 7 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- C# Exe that can remotely retrieve C# assemblies for in-memory execution☆19Updated 6 years ago
- An example pattern in C# for watching security events (logon/logoff/privilege)☆17Updated 6 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 5 years ago