SCOTPAUL / keylogLinks
A simple C keylogger for Linux
☆69Updated 5 years ago
Alternatives and similar repositories for keylog
Users that are interested in keylog are comparing it to the libraries listed below
Sorting:
- chntpw for crack windows password using Linux☆55Updated 12 years ago
- arp-poison (aka arp spoof) tool☆42Updated 12 years ago
- simple shellcode generator☆114Updated 8 years ago
- Reverse engineering challenges☆52Updated 6 years ago
- JynxKit2 is an LD_PRELOAD userland rootkit based on the original JynxKit. The backdoor has been replaced with an "accept()" system hook.☆180Updated 12 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 6 years ago
- Assignments for the SecurityTube Linux Assembly Expert Certification (SLAE)☆22Updated 6 years ago
- www.phrack.org☆78Updated 2 years ago
- Fully functional but simplified Linux Kernel Module (LKM) Rootkit for educational purposes☆62Updated 6 years ago
- ☆65Updated 8 years ago
- Detect hidden files and text in images☆121Updated 2 years ago
- This repository consists of bruteforce to a 7z file, and it can be very useful in the penetration tests☆42Updated 6 years ago
- A simple attack against gcc and Python via kernel module, with highly detailed comments.☆25Updated 10 years ago
- shell for nasm☆65Updated 5 years ago
- Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.☆73Updated 5 years ago
- Code from the book "Designing BSD Rootkits: An Introduction to Kernel Hacking"☆44Updated 9 years ago
- cve-2018-10933 libssh authentication bypass☆109Updated 7 years ago
- A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.☆42Updated 7 years ago
- Obfuscate your Bash Code 🛡️☆105Updated last year
- Source codes of malwares, stress tests etc. for computer.☆38Updated 5 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 5 years ago
- "Polymorphic" shellcode generator (x86)☆25Updated 11 years ago
- Linux v4.x.x Rootkit☆93Updated last year
- An example rootkit that gives a userland process root permissions☆77Updated 6 years ago
- ☆10Updated 7 years ago
- LOCAL ROOT EXPLOITS☆37Updated 7 years ago
- Service for management of hosts where is present a malware developed using Richkware framework.☆18Updated last year
- Executables created while writing "Introduction to Manual Backdooring".☆80Updated 8 years ago
- Windows Reverse Shell shellcode☆61Updated 3 years ago