SCOTPAUL / keylogLinks
A simple C keylogger for Linux
☆69Updated 5 years ago
Alternatives and similar repositories for keylog
Users that are interested in keylog are comparing it to the libraries listed below
Sorting:
- simple shellcode generator☆114Updated 8 years ago
- A collection of some interesting network security projects☆61Updated 7 years ago
- arp-poison (aka arp spoof) tool☆41Updated 12 years ago
- Minimal keylogger written in C, remote upload of keystrokes and screen snapshots!☆27Updated 8 years ago
- Reverse engineering challenges☆52Updated 6 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- This repository consists of bruteforce to a 7z file, and it can be very useful in the penetration tests☆42Updated 6 years ago
- chntpw for crack windows password using Linux☆56Updated 13 years ago
- ELF binary infector☆33Updated 14 years ago
- www.phrack.org☆81Updated 2 years ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 6 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆83Updated 6 years ago
- JynxKit2 is an LD_PRELOAD userland rootkit based on the original JynxKit. The backdoor has been replaced with an "accept()" system hook.☆181Updated 13 years ago
- Collection of articles about realmode 16bit assembly☆67Updated 2 years ago
- Linux Rootkits (4.x Kernel)☆86Updated 4 years ago
- A simple attack against gcc and Python via kernel module, with highly detailed comments.☆25Updated 11 years ago
- Fully functional but simplified Linux Kernel Module (LKM) Rootkit for educational purposes☆62Updated 6 years ago
- Obfuscate your Bash Code 🛡️☆105Updated last year
- Open and censorship resistant crackmes repository☆129Updated 6 years ago
- Python implementation of Metasploit's pattern_create/pattern_offset.☆73Updated 6 years ago
- Milw0rm website's mirror ! For old time's sake !☆51Updated 5 years ago
- SLAE Assignments☆39Updated last year
- Executables created while writing "Introduction to Manual Backdooring".☆80Updated 8 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆177Updated last year
- Detect hidden files and text in images☆126Updated 2 years ago
- ☆65Updated 9 years ago
- Windows Reverse Shell shellcode☆61Updated 3 years ago
- Fetch, install and search exploit archives from exploit sites.☆117Updated 2 years ago
- REPTILEHAUS' simplified build process of Worawit Wang' (@sleepya_) version of EternalBlue.. The NSA exploit brought to you by the ShadowB…☆127Updated 3 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Updated 9 years ago