enaudon / keylogger
a kernel-based keylogger for the linux kernel (v2.6.38)
☆15Updated 13 years ago
Alternatives and similar repositories for keylogger:
Users that are interested in keylogger are comparing it to the libraries listed below
- POC of code that downloads and executes shellcode in memory.☆80Updated 10 years ago
- This project uses the .NET framework to bypass Antivirus solutions.☆29Updated 11 years ago
- A collection of shellcodes☆67Updated 12 years ago
- ☆20Updated last year
- random python stuff☆25Updated 9 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- MS15-076 Privilege Escalation☆100Updated 9 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- A RAT (Remote Administration Tool) using port-knocking techniques for *NIX systems I wrote in 2006 but still works in 2017. libpcap-based…☆48Updated 7 years ago
- Hide JavaScript inside your GIF and BMP images☆26Updated 9 years ago
- Simple tool to automate adding shellcode to PE files☆49Updated 6 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated last year
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆79Updated 6 years ago
- Detect sandbox by cursor movement speed☆52Updated 2 years ago
- C++ Keylogger for windows 7. Works with DLL injection on explorer.exe☆23Updated 10 years ago
- Yet Another SMB PSEXEC (Y.A.S.P) Tool☆21Updated 11 years ago
- Patch pyc files with your code. Fairly lame.☆67Updated 9 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆77Updated 7 years ago
- A curated list of rootkits found on Github and other sites.☆62Updated 7 years ago
- RatHole is a unix backdoor which compiles cleanly on standard linux and openbsd (probably other bsd flavours also) without addicional lib…☆37Updated 11 years ago
- Decrypt MITM SSL RDP and save to pcap☆53Updated 10 years ago
- Inject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellc…☆21Updated 12 years ago
- Searches for interesting cached DNS entries.☆54Updated 10 years ago
- CVE-2017-11882 File Generator PoC☆35Updated 7 years ago
- A Linux Kernel Module that adds a backdoor to your system☆39Updated 15 years ago
- A collection of publicly released whitepapers☆49Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- Scripts that aren't PowerShell☆48Updated 5 years ago
- An evolving hacking framework written in python☆11Updated 10 years ago