Chrome Keylogger Extension
☆168Oct 27, 2015Updated 10 years ago
Alternatives and similar repositories for ChromeLogger
Users that are interested in ChromeLogger are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- iSpy Keylogger☆48Dec 24, 2016Updated 9 years ago
- Im a free fire max I'd hacker I'm hack all tipes of IDs fb and google☆34May 8, 2023Updated 2 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Apr 1, 2014Updated 12 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21May 19, 2014Updated 11 years ago
- ☆15Aug 12, 2009Updated 16 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Jul 7, 2015Updated 10 years ago
- DNS TCP to UDP proxy☆10Jul 19, 2015Updated 10 years ago
- MySQL UDF skeleton project☆20Jan 13, 2020Updated 6 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago
- CLI tool written in Go to generate Canary Tokens from https://canarytokens.org☆13Aug 22, 2025Updated 8 months ago
- Proof of Concept - Using squid url rewrite feature to "hijack" proxy traffic and inject BeEF payload into it.☆13Feb 23, 2015Updated 11 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Aug 27, 2014Updated 11 years ago
- Chrome Keylogger Extension | Post Exploitation Tool☆442Apr 26, 2022Updated 4 years ago
- A bunch of scripts used for network defense during competitions.☆15Apr 3, 2015Updated 11 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- its a keylogger for windows which sends an email with all the keys logged. Written in c# using visual studio 2015 community edition.☆15Oct 4, 2019Updated 6 years ago
- A Win32 PE/Executable Crypter that employs on the fly encryption & decryption of memory☆33Feb 14, 2014Updated 12 years ago
- melter library for Win32 PE files☆18Jul 6, 2015Updated 10 years ago
- an autodialer written in nodejs using the twilio api (not functional)☆11Mar 8, 2015Updated 11 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Oct 30, 2018Updated 7 years ago
- Zeus Gameover reverse engineering work☆16Feb 11, 2014Updated 12 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Jan 11, 2017Updated 9 years ago
- Teensy code to brute force a keylogger's unlock code☆15Sep 5, 2016Updated 9 years ago
- A password cracking IRC bot☆18May 24, 2014Updated 11 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This is my implementation of JSRat.ps1 in Python so you can now run the attack server from any OS instead of being limited to a Windows O…☆300May 5, 2016Updated 9 years ago
- ☆13Jun 11, 2014Updated 11 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆18Jan 29, 2012Updated 14 years ago
- Create custom Windows batch files from a configuration file☆32Oct 29, 2016Updated 9 years ago
- UDP to TCP tunnel for sending datagrams through weak network☆12Jan 31, 2013Updated 13 years ago
- ☆33Oct 17, 2014Updated 11 years ago
- SprayWMI is an easy way to get mass shells on systems that support WMI. Much more effective than PSEXEC as it does not leave remnants on …☆251Nov 24, 2015Updated 10 years ago
- Asynchronous NFSv3 client in pure Python☆29Jul 16, 2025Updated 9 months ago
- A Bitcoin ready e-store☆16Oct 24, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆46Apr 6, 2017Updated 9 years ago
- Rust binding for Keystone assembler framework☆11Dec 9, 2018Updated 7 years ago
- Tools developed to test the Redirect to SMB issue☆84Jun 2, 2015Updated 10 years ago
- Wi-Fi Backdoors☆42Aug 5, 2015Updated 10 years ago
- XSS Weaponization☆34Sep 23, 2013Updated 12 years ago
- A standalone PHP backdoor for use on *nix and Windows systems.☆50Sep 24, 2016Updated 9 years ago
- CryptoJoker is an open source ransomware written in C# created for education purposes only.☆22Jul 8, 2017Updated 8 years ago