SCOTPAUL / keylog
A simple C keylogger for Linux
☆67Updated 4 years ago
Alternatives and similar repositories for keylog:
Users that are interested in keylog are comparing it to the libraries listed below
- A simple attack against gcc and Python via kernel module, with highly detailed comments.☆22Updated 10 years ago
- arp-poison (aka arp spoof) tool☆38Updated 12 years ago
- ☆42Updated 7 years ago
- Universal Linux LKM rootkit, designed to work in any kernel version and both architectures (i686 and x86_64).☆39Updated last year
- Generate very tiny reverse shell binaries for Linux~☆75Updated 4 years ago
- SpooKey is a keylogger written in C++ that uses kernel-level APIs to capture keystrokes (Linux only. Windows is a work in progress)☆32Updated 5 years ago
- Assembly language files and Shellcode☆34Updated 3 years ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 5 years ago
- This repo basically contains the code that was mentioned in the blogposts that was written by me at:☆95Updated 2 years ago
- Assignments for the SecurityTube Linux Assembly Expert Certification (SLAE)☆21Updated 6 years ago
- Mass malicious script dump/Malware src dump☆56Updated 8 years ago
- A reverse shell wrapper for tor servers. Get a shell over tor via socat.☆11Updated 9 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆84Updated 5 years ago
- Reverse engineering challenges☆50Updated 5 years ago
- Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.☆69Updated 5 years ago
- Minimal keylogger written in C, remote upload of keystrokes and screen snapshots!☆28Updated 7 years ago
- 🔓 x86 Linux Kernel rootkit for Debian 9 (4.9.0-11-686-pae)☆34Updated 5 years ago
- A simple ELF Virus that can execute malacious code, infect other ELF files, and execute the host file's code normally.☆42Updated 7 years ago
- Code from the book "Designing BSD Rootkits: An Introduction to Kernel Hacking"☆43Updated 8 years ago
- simple shellcode generator☆113Updated 8 years ago
- Let's try to create a rootkit!☆20Updated 5 years ago
- A collection of tools that deal with crypto and cryptanalysis. For educational purposes only. These tools are likely not a good substitut…☆23Updated 6 years ago
- Zero-Day Code Injection and Persistence Technique☆26Updated 8 years ago
- A simple keylogger for Linux systems☆111Updated 10 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆54Updated 3 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆58Updated 8 years ago
- persistent windows backdoor with reverse shell☆25Updated 4 years ago
- A Linux RAT in C☆33Updated 6 years ago
- Reverse Shell for Android☆23Updated 11 years ago
- shell for nasm☆64Updated 4 years ago