carlospolop / KeyLoggerWinLinks
Windows Keylogger in C++
☆19Updated 2 years ago
Alternatives and similar repositories for KeyLoggerWin
Users that are interested in KeyLoggerWin are comparing it to the libraries listed below
Sorting:
- Selenium based bot that automatize the creation of accounts in a web page☆14Updated 2 years ago
- Automate the creation of Backdoors and postexplotation activities☆23Updated 3 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆30Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆54Updated 4 years ago
- PHP Script intdended to be used during Phishing campaigns as a credentials collector linked to backdoored HTML <form> action parameter☆61Updated 3 years ago
- Simple script to download some missing tools in Kali☆34Updated 4 years ago
- ☆53Updated 4 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆122Updated 5 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆39Updated 2 years ago
- WebHook for Red Team☆26Updated 4 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆22Updated 3 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆30Updated 3 years ago
- A quick-and-easy bash script installing and launching EvilGinx2, a phishing reverse-proxy☆29Updated 6 years ago
- Windows privilege escalation with cmd☆91Updated 3 years ago
- Brutteforce for stego CTFs☆16Updated 2 years ago
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆14Updated 5 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 3 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆149Updated 3 years ago
- Repository of tools used in my blog☆51Updated last year
- AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities☆74Updated 3 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 2 years ago
- A multi threaded Python script designed to brute force directories and files names on webservers.☆78Updated 3 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆83Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆11Updated 4 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆17Updated 4 years ago
- ☆15Updated 3 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆62Updated 4 years ago
- Bramble is a hacking Open source suite.☆83Updated 5 years ago