Xeroday / ChromeLoggerView external linksLinks
Chrome Keylogger Extension
☆167Oct 27, 2015Updated 10 years ago
Alternatives and similar repositories for ChromeLogger
Users that are interested in ChromeLogger are comparing it to the libraries listed below
Sorting:
- CLI tool written in Go to generate Canary Tokens from https://canarytokens.org☆13Aug 22, 2025Updated 5 months ago
- DNS TCP to UDP proxy☆10Jul 19, 2015Updated 10 years ago
- Small Rust script that cracked Yearn's v2 site password from a hashed copy☆14Dec 7, 2020Updated 5 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Jul 7, 2015Updated 10 years ago
- iSpy Keylogger☆48Dec 24, 2016Updated 9 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago
- White-hat hacking keylogger☆18Apr 9, 2015Updated 10 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21May 19, 2014Updated 11 years ago
- Im a free fire max I'd hacker I'm hack all tipes of IDs fb and google☆32May 8, 2023Updated 2 years ago
- A bunch of scripts used for network defense during competitions.☆15Apr 3, 2015Updated 10 years ago
- Small utility package for manipulating Windows process tokens☆26Apr 26, 2022Updated 3 years ago
- Wi-Fi Backdoors☆42Aug 5, 2015Updated 10 years ago
- melter library for Win32 PE files☆18Jul 6, 2015Updated 10 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Apr 1, 2014Updated 11 years ago
- A Chrome extension to steal your passwords☆21Mar 20, 2021Updated 4 years ago
- A binary analysis tool for linux☆71Jun 2, 2020Updated 5 years ago
- This is my implementation of JSRat.ps1 in Python so you can now run the attack server from any OS instead of being limited to a Windows O…☆300May 5, 2016Updated 9 years ago
- strace keylogger PoC☆44Apr 9, 2018Updated 7 years ago
- UDP to TCP tunnel for sending datagrams through weak network☆12Jan 31, 2013Updated 13 years ago
- Rust binding for Keystone assembler framework☆11Dec 9, 2018Updated 7 years ago
- Proof of Concept - Using squid url rewrite feature to "hijack" proxy traffic and inject BeEF payload into it.☆13Feb 23, 2015Updated 10 years ago
- Library for Object Linking and Embedding (OLE) data types☆12Nov 27, 2025Updated 2 months ago
- Network aware keylogger: broadcasting on your local area network.☆22Jul 29, 2013Updated 12 years ago
- golang for http socks5 proxy☆20Jan 16, 2014Updated 12 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Dec 29, 2021Updated 4 years ago
- Bash-style pipelining for Python generators.☆17Apr 20, 2011Updated 14 years ago
- Docker for CentOS Weblogic with domain☆12Jun 22, 2017Updated 8 years ago
- A fast python tool for creating permutations of alphanumerics☆11Mar 22, 2020Updated 5 years ago
- SprayWMI is an easy way to get mass shells on systems that support WMI. Much more effective than PSEXEC as it does not leave remnants on …☆250Nov 24, 2015Updated 10 years ago
- Asynchronous NFSv3 client in pure Python☆28Jul 16, 2025Updated 6 months ago
- A simple scanner to find and brute force tomcat manager logins☆27Dec 11, 2019Updated 6 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Sep 10, 2013Updated 12 years ago
- ☆46Apr 6, 2017Updated 8 years ago
- Reversing Google Drive and other goodies ;)☆27Sep 26, 2013Updated 12 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆21Jul 9, 2022Updated 3 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- p0f Python Wrapper☆17Sep 29, 2013Updated 12 years ago
- ☆11Jun 10, 2015Updated 10 years ago
- ☆12Feb 28, 2022Updated 3 years ago