Basic c-keylogger
☆26Mar 11, 2018Updated 7 years ago
Alternatives and similar repositories for ceylogger
Users that are interested in ceylogger are comparing it to the libraries listed below
Sorting:
- Custom THP Dropper☆26Mar 27, 2018Updated 7 years ago
- ☆42Apr 20, 2018Updated 7 years ago
- Preventing malicious takeover of the retired slurp AWS tool☆40Aug 27, 2018Updated 7 years ago
- The source code of the SLAE assignments documented at https://rastating.github.io/☆24Sep 25, 2018Updated 7 years ago
- Random programs for evil coding.☆21Mar 25, 2022Updated 3 years ago
- Simple class to search and upload files☆28Aug 13, 2019Updated 6 years ago
- Related subdomains finder☆28May 18, 2022Updated 3 years ago
- ☆29Apr 20, 2018Updated 7 years ago
- A cross platform tool for verifying credentials and executing single commands☆33Apr 19, 2019Updated 6 years ago
- Reverse shell for remote administration☆29Feb 12, 2018Updated 8 years ago
- Windows Sandbox Framework☆40Dec 31, 2021Updated 4 years ago
- ☆10Aug 18, 2021Updated 4 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆37Jun 26, 2019Updated 6 years ago
- Offensive go lang series☆35May 2, 2020Updated 5 years ago
- ☆15Feb 15, 2022Updated 4 years ago
- poc for cve-2025-53772☆46Dec 10, 2025Updated 2 months ago
- Metadefender Core (Metascan v.4 and v.3) analysis module for Viper malware analysis framework☆10Jan 6, 2021Updated 5 years ago
- Full nodejs Remote Administration Tools with socket.io☆30Jun 11, 2017Updated 8 years ago
- A maid cafe's maid AI assistant with Microsoft Semantic Kernel☆10May 11, 2024Updated last year
- Small POC written in C# that performs shellcode injection on x64 processes using direct syscalls as a way to bypass user-land EDR hooks.☆85Dec 20, 2019Updated 6 years ago
- Simple protector to show how to run a payload without dropping it using RunPE Technique☆35Jul 3, 2017Updated 8 years ago
- Exploit code for CVE-2019-11707 on Firefox 66.0.3 running on Ubuntu☆42Aug 18, 2019Updated 6 years ago
- ☆11Aug 7, 2021Updated 4 years ago
- Find and Use Cheats via the PythonGDB API☆11Aug 1, 2016Updated 9 years ago
- Monitor Files and Folders for Changes in Real Time .☆11Jan 10, 2019Updated 7 years ago
- ☆10Sep 12, 2019Updated 6 years ago
- This is a tutorial and introduction to Reflective DLL Injection + reading outputs of injected dll using named pipes.☆20Feb 8, 2025Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Feb 12, 2023Updated 3 years ago
- Rust + Tor (embedded) + Static (compile) + Windows + Proof of Concept☆13Feb 4, 2018Updated 8 years ago
- General purpose Discord Bot with the hacker in mind☆13Nov 6, 2025Updated 3 months ago
- Scan for open S3 buckets and dump☆10Mar 8, 2018Updated 7 years ago
- ☆11Apr 23, 2019Updated 6 years ago
- ☆47Apr 1, 2020Updated 5 years ago
- The .NET equivalent of Window's rundll.exe/rundll32.exe☆11Oct 24, 2020Updated 5 years ago
- Plaform independent reverse shell over https☆11Mar 2, 2020Updated 6 years ago
- ☆15Mar 28, 2015Updated 10 years ago
- For the benefit of programmers.☆10Oct 28, 2021Updated 4 years ago
- Google maps http and ip lookup for ida pro☆14Mar 10, 2019Updated 6 years ago
- A tool to show the method info at runtime☆13Aug 12, 2019Updated 6 years ago