Z4kSec / Keylogger
C++ Keylogger for windows 7. Works with DLL injection on explorer.exe
☆23Updated 10 years ago
Related projects ⓘ
Alternatives and complementary repositories for Keylogger
- Simple RAT (only on own network) made in C++☆16Updated 11 years ago
- Citadel 1.3.5.1☆27Updated 11 years ago
- ☆22Updated 8 years ago
- Various Crypter Project☆51Updated 10 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆41Updated 6 years ago
- Alina POS Source Code + Rootkit☆23Updated 9 years ago
- ☆26Updated 7 years ago
- Pay the Pony is hilarityware that uses the Reflective DLL injection library to inject into a remote process, encrypt and demand a ransom …☆28Updated 10 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Updated 6 years ago
- This project uses the .NET framework to bypass Antivirus solutions.☆29Updated 11 years ago
- Dexter v2 - Point of Sales Trojan☆26Updated 9 years ago
- Inject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellc…☆21Updated 12 years ago
- Brute force para MySQL com algoritmo que utiliza nome do domínio como usuário e senha, dentre outras funcionalidades.☆15Updated 9 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆79Updated 5 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 7 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 8 years ago
- metasploit loader with antivirus bypass module☆17Updated 8 years ago
- The Horrific Omnipotent Rootkit☆21Updated 7 years ago
- simple rootkit for computer security class☆13Updated 11 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆37Updated 11 years ago
- Power Loader botnet☆38Updated 9 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆28Updated 3 years ago
- ZeroRemote Trojan SRC Extract☆19Updated 7 years ago
- Ring3 Rootkit Backdoor.☆41Updated 9 years ago
- Social Engineering: Simple way to make a fake file for Backdoors☆24Updated last year