Totktonada / keylogger
Educational winapi keylogger
☆18Updated 10 years ago
Alternatives and similar repositories for keylogger:
Users that are interested in keylogger are comparing it to the libraries listed below
- Simple standalone bundle of NT core APIs☆25Updated 8 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆41Updated 11 years ago
- Ida Plugin to Use the Awsome Scylla plugin☆21Updated 9 years ago
- windows create process with a dll load first time via LdrHook☆30Updated 8 years ago
- Pay the Pony is hilarityware that uses the Reflective DLL injection library to inject into a remote process, encrypt and demand a ransom …☆28Updated 10 years ago
- Anti-AV compilation☆42Updated 11 years ago
- A plugin for IDA Pro that assists in decoding arbitrary character sets in an IDA Pro database into Unicode, then automatically invoking a…☆52Updated 10 years ago
- Small script to assemble/disassemble from CLI☆22Updated 2 years ago
- elfcrypter is a free, open source, ELF ( Executable and Linkable Format ) software protector, written in C/C++ and Assembler. Support for…☆28Updated 11 years ago
- ☆43Updated 7 years ago
- Short for Good Ware; it assists Reverse Engineers in the analysis of Windows Malware.☆24Updated 12 years ago
- Windows kernel vulnerability in win32k.sys Driver☆34Updated 9 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆33Updated 8 years ago
- Telegram bot for assembling and disassembling on-the-go.☆21Updated 2 years ago
- A linux rootkit works on kernel 4.0.X or higher☆36Updated 8 years ago
- CVE-2014-0816☆24Updated 8 years ago
- Bootkits Revisited☆41Updated 10 years ago
- This is a framework for automatically finding bugs, and exploiting them...☆5Updated 9 years ago
- A toy Linux rootkit.☆13Updated 11 years ago
- Allows a user to grab documentation from online MSDN for a given function name in IDA, and import the documentation as a repeatable comme…☆15Updated 12 years ago
- Dll Injection and Code injection sample☆13Updated 9 years ago
- Code Injector Using Code Caves☆14Updated 9 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 11 years ago
- Malware monitor template based on MinHook☆16Updated 9 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Updated 8 years ago
- Maltrace is a simple syscall tracer for Windows implemented through the use of PIN.☆23Updated 11 years ago
- ☆27Updated 2 years ago
- IDA plugin to patch IDA Pro in memory.☆49Updated 8 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Updated 9 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Updated 9 years ago