cyrus-and / xkeyloggerLinks
Rootless keylogger for X
☆34Updated 5 years ago
Alternatives and similar repositories for xkeylogger
Users that are interested in xkeylogger are comparing it to the libraries listed below
Sorting:
- Inject shellcode into running processes in Linux.☆43Updated 10 months ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Updated 9 years ago
- Reverse shell and rootkit☆19Updated 8 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Updated 6 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- ☆16Updated 5 years ago
- Modular rootkit framework.☆29Updated 4 years ago
- Golang port for Metasploit's pattern_create and pattern_offset☆12Updated 4 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆23Updated 7 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 9 years ago
- (Unofficial) Python API for http://namechk.com☆19Updated 9 years ago
- Brute-force script for finding azorult XOR key.☆14Updated 6 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Updated 4 years ago
- ☆25Updated 6 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- Networking exploration in golang to build a security enhanced version of netcat☆10Updated 7 years ago
- Rex library for various exploitation helpers☆22Updated last month
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Updated 2 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- Watches for trigger packets, runs commands or spawns a shell☆24Updated 6 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Updated 10 months ago
- "Polymorphic" shellcode generator (x86)☆23Updated 10 years ago
- dragon.c: sniffing, non binding, reverse down/exec, portknocking service * Based on cd00r.c by fx@phenoelit.de and helldoor.c by drizzt@…☆9Updated 11 years ago
- Python script to patch the reflective stub in a DLL☆24Updated 8 years ago
- collection of useful shells for penetration tests☆37Updated 8 years ago