Chrome Keylogger Extension
☆168Oct 27, 2015Updated 10 years ago
Alternatives and similar repositories for ChromeLogger
Users that are interested in ChromeLogger are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- iSpy Keylogger☆49Dec 24, 2016Updated 9 years ago
- White-hat hacking keylogger☆18Apr 9, 2015Updated 11 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Apr 1, 2014Updated 12 years ago
- A Chrome extension to steal your passwords☆21Mar 20, 2021Updated 5 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21May 19, 2014Updated 12 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Jul 7, 2015Updated 10 years ago
- DNS TCP to UDP proxy☆10Jul 19, 2015Updated 10 years ago
- Docker for CentOS Weblogic with domain☆12Jun 22, 2017Updated 8 years ago
- MySQL UDF skeleton project☆20Jan 13, 2020Updated 6 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago
- CLI tool written in Go to generate Canary Tokens from https://canarytokens.org☆13Aug 22, 2025Updated 9 months ago
- Proof of Concept - Using squid url rewrite feature to "hijack" proxy traffic and inject BeEF payload into it.☆13Feb 23, 2015Updated 11 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Aug 27, 2014Updated 11 years ago
- Chrome Keylogger Extension | Post Exploitation Tool☆445Apr 26, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A bunch of scripts used for network defense during competitions.☆15Apr 3, 2015Updated 11 years ago
- A Win32 PE/Executable Crypter that employs on the fly encryption & decryption of memory☆33Feb 14, 2014Updated 12 years ago
- golang for http socks5 proxy☆20Jan 16, 2014Updated 12 years ago
- an autodialer written in nodejs using the twilio api (not functional)☆11Mar 8, 2015Updated 11 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Oct 30, 2018Updated 7 years ago
- Zeus Gameover reverse engineering work☆16Feb 11, 2014Updated 12 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Jan 11, 2017Updated 9 years ago
- Teensy code to brute force a keylogger's unlock code☆15Sep 5, 2016Updated 9 years ago
- A password cracking IRC bot☆18May 24, 2014Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- This is my implementation of JSRat.ps1 in Python so you can now run the attack server from any OS instead of being limited to a Windows O…☆300May 5, 2016Updated 10 years ago
- ☆13Jun 11, 2014Updated 11 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆18Jan 29, 2012Updated 14 years ago
- UDP to TCP tunnel for sending datagrams through weak network☆12Jan 31, 2013Updated 13 years ago
- ☆33Oct 17, 2014Updated 11 years ago
- SprayWMI is an easy way to get mass shells on systems that support WMI. Much more effective than PSEXEC as it does not leave remnants on …☆251Nov 24, 2015Updated 10 years ago
- Asynchronous NFSv3 client in pure Python☆30Jul 16, 2025Updated 10 months ago
- A Bitcoin ready e-store☆16Oct 24, 2017Updated 8 years ago
- Rust binding for Keystone assembler framework☆11Dec 9, 2018Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- مستودع خاص بأكاديمية حسوب، يحوي الأمثلة المرفقة بدروس تطوير الويب☆13Sep 10, 2021Updated 4 years ago
- Tools developed to test the Redirect to SMB issue☆84Jun 2, 2015Updated 10 years ago
- Wi-Fi Backdoors☆42Aug 5, 2015Updated 10 years ago
- XSS Weaponization☆34Sep 23, 2013Updated 12 years ago
- A standalone PHP backdoor for use on *nix and Windows systems.☆50Sep 24, 2016Updated 9 years ago
- CryptoJoker is an open source ransomware written in C# created for education purposes only.☆22Jul 8, 2017Updated 8 years ago
- an evil chrome extension that steals credentials from form inputs☆28Aug 5, 2020Updated 5 years ago