carlospolop / KeyLoggerWinLinks
Windows Keylogger in C++
☆19Updated 3 years ago
Alternatives and similar repositories for KeyLoggerWin
Users that are interested in KeyLoggerWin are comparing it to the libraries listed below
Sorting:
- Windows privilege escalation with cmd☆90Updated 3 years ago
- Hello my friends, it is my repo about sql injections. Call me in Telegram: @anakein☆43Updated 4 years ago
- Automate the creation of Backdoors and postexplotation activities☆23Updated 3 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆149Updated 4 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆122Updated 5 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆21Updated 3 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- Selenium based bot that automatize the creation of accounts in a web page☆14Updated 3 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆84Updated 3 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- ☆53Updated 4 years ago
- Stack based buffer overflows attacks made simple. BufferSploit is a semi automated CLI based tool for performing stack based buffer overf…☆20Updated 4 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆25Updated 7 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆56Updated 5 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆84Updated 4 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆30Updated 3 years ago
- Useful Commands, Reverse Shell, Privilege Escalation Methods, Impersonation Attacks, Useful Powershell Commands and more☆120Updated 5 years ago
- WebHook for Red Team☆26Updated 4 years ago
- Simple script to download some missing tools in Kali☆33Updated 4 years ago
- Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pent…☆96Updated 4 years ago
- Fast and intuitive manager for multiple reverse shells☆86Updated 11 months ago
- Airodump-ng WiFi Scan Visualizer☆60Updated 7 years ago
- PHP Script intdended to be used during Phishing campaigns as a credentials collector linked to backdoored HTML <form> action parameter☆61Updated 4 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆64Updated 4 years ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Updated 4 years ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year