strace keylogger PoC
☆44Apr 9, 2018Updated 7 years ago
Alternatives and similar repositories for skl
Users that are interested in skl are comparing it to the libraries listed below
Sorting:
- ☆23Oct 14, 2013Updated 12 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆29Sep 17, 2019Updated 6 years ago
- Network aware keylogger: broadcasting on your local area network.☆22Jul 29, 2013Updated 12 years ago
- A fast python tool for creating permutations of alphanumerics☆11Mar 22, 2020Updated 5 years ago
- ☆16Jun 1, 2018Updated 7 years ago
- Some stuff about the TCP flags field in NetFlow/IPFIX Data☆12Dec 31, 2015Updated 10 years ago
- Mainframe bruter and screen automation utility.☆20Jul 27, 2021Updated 4 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆14Feb 9, 2015Updated 11 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- This is a custom SSM agent which is sorta functional☆17Jul 5, 2021Updated 4 years ago
- PIC code gen and loading☆13Jul 25, 2017Updated 8 years ago
- ☆20Oct 14, 2013Updated 12 years ago
- A no-nonsense web scraping tool which removes the crap and preserves the content in epub and pdf formats.☆41Jan 10, 2016Updated 10 years ago
- various slides and presentations I've worked on☆19Mar 21, 2025Updated 11 months ago
- ☆20Oct 7, 2013Updated 12 years ago
- Ansible role to deploy RedELK server☆19Sep 11, 2023Updated 2 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Aug 5, 2016Updated 9 years ago
- ☆26Sep 29, 2018Updated 7 years ago
- Grab ssh keys from ssh-agent☆221Mar 22, 2020Updated 5 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- A tool to catch spoofed NBNS responses.☆51Jun 13, 2018Updated 7 years ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆33Feb 16, 2026Updated 2 weeks ago
- Small utility package for manipulating Windows process tokens☆26Apr 26, 2022Updated 3 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆24Sep 19, 2022Updated 3 years ago
- Updated version of C2K☆51Mar 22, 2018Updated 7 years ago
- A C# tool to send emails through Outlook from the command line or in memory☆32Jun 17, 2020Updated 5 years ago
- Enterprise WPA Wireless Tool Suite☆87Sep 13, 2022Updated 3 years ago
- Local osx dialog box phishing using osascript. Easier than keylogging on osx. Simply ask for the passwords you want.☆56Nov 1, 2018Updated 7 years ago
- Files that relate to the Wordfence report on DHS Grizzly Steppe data☆21Jan 8, 2017Updated 9 years ago
- A powershell script for cracking halfLMchall password hashes☆22Feb 5, 2013Updated 13 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Dec 31, 2018Updated 7 years ago
- Empire HTTP(S) C2 redirector setup script☆48Jul 10, 2018Updated 7 years ago
- PowerShell Module Bindings for Capstone/Keystone☆25Nov 15, 2016Updated 9 years ago
- A binary analysis tool for linux☆71Jun 2, 2020Updated 5 years ago
- Reverse engineered APT38 DYEPACK samples used to empty SWIFT banking servers. Use caution when handling live binaries.☆23Mar 20, 2019Updated 6 years ago
- Hostile Dropboxes Management☆26Jan 8, 2020Updated 6 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Dec 7, 2018Updated 7 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆35Jul 22, 2021Updated 4 years ago
- ☆26Apr 5, 2020Updated 5 years ago