A script to automate keystrokes through a graphical desktop program.
☆34Jun 10, 2025Updated 11 months ago
Alternatives and similar repositories for RemoteKeyStrokes
Users that are interested in RemoteKeyStrokes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆54Feb 22, 2024Updated 2 years ago
- SpeedyTest☆17Jun 21, 2023Updated 2 years ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Jan 20, 2024Updated 2 years ago
- keep watching new bug bounty (vulnerability) postings.☆12Apr 7, 2024Updated 2 years ago
- A windows Wifi Brute forcing utility which is an extremely old method but still works without the requirement of external dependencies.☆78Jul 13, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆11Jun 26, 2024Updated last year
- An (WIP) EDR Evasion tool for x64 Windows & Linux binaries that utilizes Nanomites, written in Rust.☆30May 8, 2026Updated 2 weeks ago
- PhantomCrawler is a Python-based web testing and research tool that simulates website interactions from multiple proxy IP addresses to an…☆80Jan 6, 2026Updated 4 months ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Mar 29, 2026Updated last month
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆136Dec 23, 2025Updated 5 months ago
- Go-based C2 server inspired by Cobalt Strike; seamless agent control, web UI, and Malleable Profile support. Fast, extensible, and secure…☆30Updated this week
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆30Apr 3, 2025Updated last year
- BackdoorSim: An Educational into Remote Administration Tools☆120Feb 7, 2024Updated 2 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆27Aug 18, 2023Updated 2 years ago
- Effortlessly browse and manage your files with ease using Tiny File Manager [WH1Z-Edition], a compact single-file PHP file manager.☆25Feb 13, 2024Updated 2 years ago
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆21Apr 2, 2025Updated last year
- Automatic security vulnerability remediation for your code.☆66May 11, 2026Updated last week
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆17Jul 3, 2025Updated 10 months ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆61Apr 16, 2024Updated 2 years ago
- POCs for CVE-2025-50154 and CVE-2025-59214, zero day vulnerabilities on windows file explorer disclosing NTLMv2-SSP without user interact…☆53Oct 16, 2025Updated 7 months ago
- ☆13Mar 1, 2024Updated 2 years ago
- Azure Service Subdomain Enumeration☆76Sep 2, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Melee: Tool to Detect Infections in MySQL Instances☆23Aug 6, 2023Updated 2 years ago
- Run Cobalt Strike BOFs in Brute Ratel C4!☆88Apr 15, 2025Updated last year
- Your Skyfall Infrastructure Pack☆100Apr 10, 2026Updated last month
- An example in C# for programmatically calling UAC to escalate to admin☆14Aug 13, 2018Updated 7 years ago
- 「💀」Proof of concept on BYOVD attack☆165Dec 7, 2024Updated last year
- ☆53Jul 11, 2024Updated last year
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆26Dec 23, 2025Updated 5 months ago
- ☆10Apr 1, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆15Feb 9, 2020Updated 6 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆18Jun 22, 2024Updated last year
- Evasive shellcode loader with indirect syscalls, Thread name-calling allocation, PoolParty injection☆10Feb 26, 2025Updated last year
- Python script that fetches, analyzes, and reports Microsoft Patch Tuesday updates via the MSRC API — with a clean web interface for easy …☆28Updated this week
- Yet Another Mac Changer!!!☆12Jan 26, 2023Updated 3 years ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆17Sep 10, 2024Updated last year
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆35Feb 20, 2024Updated 2 years ago