An untraceable keylogger built from scratch in C++
☆43Aug 5, 2016Updated 9 years ago
Alternatives and similar repositories for KeyLoggerPro
Users that are interested in KeyLoggerPro are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Applying some AV evasion techniques on a metasploit reverse shell☆18Nov 12, 2020Updated 5 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆20Sep 12, 2019Updated 6 years ago
- Keylogger Code In C++ Will Work On Window 7, 8, 8.1, And 10☆79Jul 12, 2018Updated 7 years ago
- Easy installers for Maru OS.☆13May 19, 2019Updated 7 years ago
- Powershell to CodeExecution and ProcessInjection☆65Jul 18, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- Advanced keylogger made in C++ that works on Window 7, 8, 8.1, And 10 - Use at your own discretion☆78Dec 10, 2017Updated 8 years ago
- shell over icmp☆34May 18, 2013Updated 13 years ago
- Ansible playbooks to facilitate redteam stuff☆14Aug 2, 2016Updated 9 years ago
- Remote Administration Tool For Windows☆13Apr 27, 2018Updated 8 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Jun 18, 2018Updated 7 years ago
- Key Logger with UI☆41Jun 11, 2016Updated 9 years ago
- Collect and filter location information from social network services.☆11Jun 14, 2020Updated 5 years ago
- powershell tool for VM evasion☆40Oct 2, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A little Keylogger for Windows developed in C++☆20Jan 24, 2016Updated 10 years ago
- Self-Loading Registration Free COM Functions☆11Nov 12, 2019Updated 6 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Oct 1, 2016Updated 9 years ago
- This is a stealthier version of Keylogger-lkm, it introduces hiding techniques and also a command entering option.☆13Jan 27, 2023Updated 3 years ago
- Script to send kippo/cowrie login attempt information to https://isc.sans.edu/ssh.html☆16Jan 12, 2017Updated 9 years ago
- A simple low-interaction port monitoring honeypot.☆19Jun 14, 2020Updated 5 years ago
- A reduced functionality cli client for the imdisk ram disk driver. To be used through a backdoor like meterpreter☆24Aug 11, 2018Updated 7 years ago
- Metasploit Framework☆16Dec 26, 2025Updated 4 months ago
- ZigBee hacking tools and scripts☆14Mar 25, 2018Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A small, unfinished utility to browse and download NirSoft programs.☆18Jun 14, 2020Updated 5 years ago
- A Python Keylogger for Windows☆47May 26, 2017Updated 8 years ago
- Teensy code to brute force a keylogger's unlock code☆15Sep 5, 2016Updated 9 years ago
- Simple windows backdoor command shell.☆20Dec 4, 2017Updated 8 years ago
- simple rootkit for computer security class☆15Dec 18, 2012Updated 13 years ago
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated 3 months ago
- ☆68Nov 28, 2018Updated 7 years ago
- Advanced Remote Access Trojan & Server☆37Mar 23, 2021Updated 5 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A Terrific Keystroke Recorder☆519Oct 20, 2025Updated 7 months ago
- A simple way for detection the remote user's antivirus☆84Oct 24, 2016Updated 9 years ago
- Notes on offensive training☆16Nov 29, 2017Updated 8 years ago
- Cloudflare compatible Reverse HTTP Shell w/ AES & Domain Fronting (via SNI) Support☆22Jul 30, 2024Updated last year
- Mobile phone PWN tools and scripts☆16Sep 20, 2020Updated 5 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- The Keylogger is able to capture all the keystrokes using system hooks. In addition to this, it is also able to put them into a file, enc…☆62Apr 22, 2018Updated 8 years ago