MojtabaTajik / FunnyKeylogger
Simple, lightweight and compact key logger written for fun ...
☆17Updated 6 years ago
Alternatives and similar repositories for FunnyKeylogger:
Users that are interested in FunnyKeylogger are comparing it to the libraries listed below
- A host based IDS written in C# Targetted at Metasploit☆44Updated 11 years ago
- Proof of concept demo for a tool that listens for keywords, and records audio to a file.☆12Updated 7 years ago
- Monitor the textual data pasted into Windows clipboard☆28Updated 6 years ago
- C# code for Transferring Backdoor Payloads by ARP Traffic and Bypassing Anti-viruses (Slow)☆44Updated last year
- An example in C# for programmatically calling UAC to escalate to admin☆14Updated 6 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Updated 6 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- This is the linux version of the R.A.T client written in c#☆10Updated 7 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Updated 4 years ago
- A simplex kernel-based keylogger written for fun, not evil.☆16Updated 7 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 6 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆25Updated 6 years ago
- A Linux RAT in C☆33Updated 6 years ago
- Scans an internal network using massscan and nmap☆20Updated last year
- Tool designed to study the answers of your DNS resolver and make easier the identification of techniques such as DNS Hijacking/Poisoning☆27Updated 6 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆24Updated 5 years ago
- C# Situational Awareness Script☆34Updated 6 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆18Updated 4 years ago
- LEMPO (Ldap Exposure on POrtainer) is an exploit for CVE-2018-19466 (LDAP Credentials Disclosure on Portainer). Featured @ DevFest Siberi…☆11Updated 4 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆22Updated 4 months ago
- Working exploit code for CVE-2019-17625☆19Updated 5 years ago
- Hide .Net assembly into png images☆36Updated 5 years ago
- This is a concept poc of command and control server implemented over blockchain☆52Updated 5 years ago
- ☆8Updated 7 years ago
- Discover MSSQL Instances via UDP Scanning☆25Updated 6 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆16Updated 7 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Updated 6 years ago
- Gmail Knocker☆21Updated 7 years ago
- A collection of tools for debugging Windows application crashes.☆9Updated 3 years ago