carlospolop / KeyLoggerWinLinks
Windows Keylogger in C++
☆19Updated 3 years ago
Alternatives and similar repositories for KeyLoggerWin
Users that are interested in KeyLoggerWin are comparing it to the libraries listed below
Sorting:
- Selenium based bot that automatize the creation of accounts in a web page☆14Updated 3 years ago
- Automate the creation of Backdoors and postexplotation activities☆23Updated 3 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆55Updated 5 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆32Updated 4 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆119Updated 5 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities☆72Updated 4 years ago
- Repository of tools used in my blog☆51Updated last year
- ☆53Updated 4 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆26Updated 7 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- ☆15Updated 4 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆17Updated 5 years ago
- WebHook for Red Team☆25Updated 4 years ago
- Hello my friends, it is my repo about sql injections. Call me in Telegram: @anakein☆43Updated 4 years ago
- Apache Tomcat Manager API WAR Shell Upload☆35Updated 5 years ago
- Simple script to download some missing tools in Kali☆33Updated 5 years ago
- PHP Script intdended to be used during Phishing campaigns as a credentials collector linked to backdoored HTML <form> action parameter☆61Updated 4 years ago
- Miscellaneous tools for BloodHound☆18Updated 4 years ago
- A quick-and-easy bash script installing and launching EvilGinx2, a phishing reverse-proxy☆30Updated 6 years ago
- Tmux configuration, that supercharges your tmux to build cozy and cool terminal environment☆14Updated 6 years ago
- Simple PHP - Javascript - Webserver Cookie Stealer Script for XSS☆58Updated 7 years ago
- A shell script that mimics sudo and sends you back the password☆45Updated 3 years ago
- Windows privilege escalation with cmd☆90Updated 4 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆119Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 6 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆148Updated 4 years ago
- Bare Bones Banking malware coded for research & educational purposes☆87Updated 5 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆21Updated 3 years ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆63Updated 2 years ago