Obrelix / Windows-Advanced-KeyloggerLinks
Advanced Keylogger written in C++11 for Windows OS
☆11Updated 8 years ago
Alternatives and similar repositories for Windows-Advanced-Keylogger
Users that are interested in Windows-Advanced-Keylogger are comparing it to the libraries listed below
Sorting:
- Work files for my blog post "Code Caving in a PE file.☆16Updated 9 years ago
- Pay the Pony is hilarityware that uses the Reflective DLL injection library to inject into a remote process, encrypt and demand a ransom …☆28Updated 11 years ago
- ☆31Updated 9 years ago
- Secure approach to secure file storage in untrusted environments.☆34Updated 6 years ago
- ☆48Updated 9 years ago
- ☆68Updated 8 years ago
- A little Keylogger for Windows developed in C++☆20Updated 10 years ago
- Yara syntax highlighting☆25Updated 4 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 9 years ago
- Official Malice Plugins☆21Updated 7 years ago
- Collection of some scripts I've written in Perl, Python BASH, GO and JS to automate some common ops.☆33Updated 7 years ago
- Dragon Sandbox☆79Updated 12 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Updated 10 years ago
- ☆15Updated 4 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆22Updated 10 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13Updated 7 years ago
- Post Exploitation Linux Toolkit☆33Updated 9 years ago
- The Horrific Omnipotent Rootkit☆23Updated 8 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 15 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 5 years ago
- A tool for the persistent XSS exploitation with a focus for mobile web browsers☆54Updated 4 years ago
- Various malware, packer, crypter, etc. detection and analysis tools☆91Updated 10 years ago
- Application for cracking Red Petya key based on genetic algorithms.☆56Updated 3 years ago
- Script to parse first load time for Shell Extensions loaded by user. Also enumerates all loaded Shell Extensions that are only installed …☆21Updated 10 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 12 years ago
- A collection of tools mostly written in Python.☆15Updated 10 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 15 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Updated 9 years ago
- Malware visualization on earth map☆40Updated 11 years ago
- ☆28Updated 9 years ago