Rootless keylogger for X
☆33Oct 18, 2019Updated 6 years ago
Alternatives and similar repositories for xkeylogger
Users that are interested in xkeylogger are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Poshito is a Windows C2 over Telegram☆21Oct 30, 2024Updated last year
- Spawn SYSTEM shells like a PRO!☆10Mar 8, 2023Updated 3 years ago
- A library for quickly and easily encrypting strings and text file content.☆12Jul 1, 2021Updated 4 years ago
- Some Cyber Security related scripts☆18Jul 18, 2023Updated 2 years ago
- Multiplatform multithread efficient stream rust ransomware☆15May 18, 2022Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Explore and filter your GitHub starred repositories☆24Dec 5, 2023Updated 2 years ago
- A tiny macro library for protecting sensitive strings in compiled binaries☆40Oct 8, 2024Updated last year
- 最近出現在影印店的病毒,會請大家幫忙挖礦 XD☆13Jun 20, 2016Updated 9 years ago
- ☆23Aug 19, 2017Updated 8 years ago
- Sleep obfuscation for shellcode implants and their reflective shit☆55Sep 19, 2023Updated 2 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- Nim process hollowing loader☆63Jul 22, 2025Updated 9 months ago
- A Rust malware controlled by a Go web interface, API and socket server.☆10Aug 22, 2022Updated 3 years ago
- Some of my Malware Analysis writeups☆50Oct 3, 2025Updated 7 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Competition Infrastructure Management☆13Oct 16, 2025Updated 7 months ago
- Writeups from various CTFs solved with Mathematica☆10Apr 15, 2017Updated 9 years ago
- DUQU MALWARE SOURCE + BINARY + More coming☆14Feb 6, 2023Updated 3 years ago
- midfunction d3d basehook for winxp, win7, win8, win10☆17Jan 21, 2019Updated 7 years ago
- Windows inject☆17Jun 7, 2018Updated 7 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆15Mar 30, 2017Updated 9 years ago
- Determine the Version Running on the Palo Alto Network Firewall for the Global Protect Portal☆12Aug 14, 2020Updated 5 years ago
- a small (~140 line) and portable 6502 emulator demo.☆19Jan 4, 2022Updated 4 years ago
- ☆21Sep 10, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Ludus roles to deploy ASR rules and MDI auditing settings☆24Aug 5, 2025Updated 9 months ago
- ☆12Oct 10, 2024Updated last year
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15May 23, 2017Updated 8 years ago
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- easy detour-, vftable-, iat- and eathooking☆12Mar 30, 2016Updated 10 years ago
- A Kali-based docker container pre-built with tools, ZSH, and SSH.☆14Nov 22, 2024Updated last year
- PoC for DHCP vulnerability (NAME:WRECK) in FreeBSD☆15Apr 14, 2021Updated 5 years ago
- Persist like a Dodder☆68May 19, 2025Updated last year
- runs sliver command on all hosts, partially based on example in sliver repo☆13Mar 23, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- My modern disassemblies of paleolithic (DOS-era) malware!☆13Mar 24, 2026Updated last month
- This workshop is designed to provide you with a solid understanding of IronPython, its integration with the .NET framework, and how it ca…☆44Mar 19, 2024Updated 2 years ago
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- ☆15Mar 2, 2014Updated 12 years ago
- Collection Of Terrible CNC/Qbot Panels☆11Aug 8, 2025Updated 9 months ago
- Simple runtime crypter in C++.☆43Dec 8, 2014Updated 11 years ago