cyrus-and / xkeyloggerLinks
Rootless keylogger for X
☆33Updated 6 years ago
Alternatives and similar repositories for xkeylogger
Users that are interested in xkeylogger are comparing it to the libraries listed below
Sorting:
- Simple runtime crypter in C++.☆43Updated 10 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆55Updated 3 years ago
- simple shellcode generator☆114Updated 8 years ago
- Modular rootkit framework.☆30Updated 4 years ago
- "Polymorphic" shellcode generator (x86)☆25Updated 11 years ago
- Hive solves a critical problem for the malware operators at the CIA.☆67Updated 8 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆130Updated 12 years ago
- Probably the first binary (PE/ELF) infector ever created in GoLang.☆50Updated 3 years ago
- Set of my small utils related to cryptography, encoding, decoding etc☆92Updated 2 months ago
- ☆65Updated 9 years ago
- Inject shellcode into running processes in Linux.☆43Updated last year
- Twitter Bot to perform advanced search and automated response☆13Updated 7 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆178Updated last year
- A Linux RAT in C☆34Updated 7 years ago
- reverse shell with tty emulation, openssl encryption and support for multiple tcp proxies☆28Updated 9 years ago
- My little precious collection of Linux 4.x kernel rootkits☆26Updated last year
- Example application for creating multiple desktops on Windows☆139Updated 7 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- A way to backdoor every process☆68Updated 8 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆65Updated 7 years ago
- medium-rare☆28Updated 6 years ago
- Creates a .lnk file with unicode chars that reverse the file extension and adds a .txt to the end to make it appear as a textfile. Paylo…☆115Updated 4 years ago
- ☆16Updated 5 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆55Updated 6 years ago
- ☆28Updated 9 years ago
- Alina Spark - Point of Sales Trojan☆48Updated 10 years ago
- Generic malicious browser check written in C#☆13Updated 9 years ago
- Passive UAC elevation using dll infection☆75Updated 11 years ago
- A VBScript for detecting VirtualBox☆22Updated 10 years ago
- collection of useful shells for penetration tests☆37Updated 8 years ago