A tiny keylogger coded with just 12 lines of Python script, which hooks to the kernel, intercepts keystrokes and forwards them to your web server over HTTPS.
☆35Jan 12, 2026Updated 4 months ago
Alternatives and similar repositories for HackTheKeyboard
Users that are interested in HackTheKeyboard are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Sep 22, 2021Updated 4 years ago
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- Escalation Servers and Scripts for Priv Escalation☆18Jul 20, 2019Updated 6 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆15Jan 20, 2021Updated 5 years ago
- XXE Injection Payloads☆28Jul 30, 2019Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A privilege escalation exploit in the Steam Client☆13Aug 11, 2019Updated 6 years ago
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆31Sep 30, 2019Updated 6 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Oct 11, 2021Updated 4 years ago
- Malduino compatible USB rubber ducky payloads☆14Jun 7, 2019Updated 6 years ago
- ☆21Dec 1, 2019Updated 6 years ago
- Framework for exploiting local vulnerabilities☆83Nov 18, 2023Updated 2 years ago
- ☆25Mar 21, 2020Updated 6 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- ☆13Nov 22, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆10Apr 18, 2019Updated 7 years ago
- Simple program to steal private files from removable storages☆84Feb 2, 2026Updated 3 months ago
- ☆20Aug 18, 2020Updated 5 years ago
- Record X11 keypress events to a log file☆28Mar 19, 2018Updated 8 years ago
- SpooKey is a keylogger written in C++ that uses kernel-level APIs to capture keystrokes (Linux only. Windows is a work in progress)☆31Feb 12, 2020Updated 6 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Jun 30, 2020Updated 5 years ago
- with metasploit☆63Apr 19, 2020Updated 6 years ago
- ☆24Mar 27, 2019Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- RainbowSQL is very fast dork&SQL injection scanner.☆61Jun 12, 2025Updated 11 months ago
- I created the python script to bypass UAC to get system shell .☆122Sep 2, 2019Updated 6 years ago
- Exploit code for CVE-2019-11707 on Firefox 66.0.3 running on Ubuntu☆42Aug 18, 2019Updated 6 years ago
- Set of security tools that can be integrated in Jenkins pipelines.☆18Sep 19, 2019Updated 6 years ago
- UglyEXe - bypass some AVs☆17Feb 28, 2020Updated 6 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆18May 29, 2020Updated 5 years ago
- Pentesting-related Bash Scripts☆12Jan 4, 2020Updated 6 years ago
- A simple reverse shell in Nim langauge. It should bypass AV-s (don't submit binaries)☆16Oct 10, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Wi-Fi Exploit Tool☆50May 23, 2020Updated 5 years ago
- Remote shell victim machines☆23Sep 13, 2019Updated 6 years ago
- ☆28Jun 18, 2019Updated 6 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆12Jul 19, 2020Updated 5 years ago
- ☆26Sep 2, 2025Updated 8 months ago
- Web Vulnerability Scanner using Shell Script☆60Jun 29, 2022Updated 3 years ago
- Single-WebApp-Target essentials testing methodology tool starting at recon-information gathering for the juicy stuff ended up in exploita…☆23Jun 15, 2021Updated 4 years ago