SCOTPAUL / keylog
A simple C keylogger for Linux
☆66Updated 4 years ago
Alternatives and similar repositories for keylog:
Users that are interested in keylog are comparing it to the libraries listed below
- arp-poison (aka arp spoof) tool☆38Updated 11 years ago
- A tiny framework for easily manipulate the tty and create fake binaries.☆155Updated 5 years ago
- A simple attack against gcc and Python via kernel module, with highly detailed comments.☆22Updated 10 years ago
- simple shellcode generator☆112Updated 8 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆84Updated 5 years ago
- chntpw for crack windows password using Linux☆52Updated 12 years ago
- ☆42Updated 6 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆58Updated 8 years ago
- SpooKey is a keylogger written in C++ that uses kernel-level APIs to capture keystrokes (Linux only. Windows is a work in progress)☆32Updated 5 years ago
- HTTP botnet☆59Updated 8 years ago
- Sample of the wanna cry ransomware.☆31Updated 7 years ago
- Milw0rm website's mirror ! For old time's sake !☆45Updated 4 years ago
- "Polymorphic" shellcode generator (x86)☆23Updated 10 years ago
- Universal Linux LKM rootkit, designed to work in any kernel version and both architectures (i686 and x86_64).☆39Updated last year
- ELF binary infector☆32Updated 13 years ago
- This repo basically contains the code that was mentioned in the blogposts that was written by me at:☆93Updated 2 years ago
- shell for nasm☆64Updated 4 years ago
- sshd-poison is a tool that modifies a sshd binary to capture password-based authentications and allows you to login in some accounts usin…☆94Updated 4 years ago
- Dump/Steal and decrypt Google Chrome passwords (Windows)☆19Updated 3 years ago
- A Linux RAT in C☆32Updated 6 years ago
- Linux Rootkits (4.x Kernel)☆82Updated 3 years ago
- Minimal keylogger written in C, remote upload of keystrokes and screen snapshots!☆28Updated 7 years ago
- Anubis Malware Samples☆19Updated 3 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆53Updated 3 years ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 5 years ago
- ☆65Updated 8 years ago
- Reverse engineering challenges☆50Updated 5 years ago
- persistent windows backdoor with reverse shell☆24Updated 4 years ago
- A simple ELF Virus that can execute malacious code, infect other ELF files, and execute the host file's code normally.☆42Updated 6 years ago
- Personal collection of Remote Administration Tool sources. Dedicated for Ax0nes Forum at Ax0nes.com for education purpose☆77Updated 7 years ago