a kernel-based keylogger for the linux kernel (v2.6.38)
☆15Dec 13, 2011Updated 14 years ago
Alternatives and similar repositories for keylogger
Users that are interested in keylogger are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- lightweight, fast and convenient image viewer and browser for MacOSX☆24Mar 27, 2011Updated 14 years ago
- Making the hikvision source code available as I receive it☆12Dec 18, 2015Updated 10 years ago
- Predictive Coding (Rao & Ballard, 1999) Model☆10May 2, 2020Updated 5 years ago
- ☆13Jul 26, 2017Updated 8 years ago
- cvloop allows online video transformation and evaluation with OpenCV. Designed for jupyter notebooks.☆17Feb 7, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Linux kernel based keylogger☆14Mar 24, 2014Updated 12 years ago
- Cooperative Communication Networks on Graphs☆14Jun 25, 2021Updated 4 years ago
- CNC botnet developed via C☆17Dec 2, 2016Updated 9 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- API tool for hashes.com escrow☆12Dec 13, 2025Updated 3 months ago
- ARM virtual machine☆41Feb 10, 2018Updated 8 years ago
- Minecraft X-Ray☆30Jul 3, 2017Updated 8 years ago
- A web component to render KaTeX expression☆12Nov 17, 2025Updated 4 months ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- botnet frontend i wrote in a night and then improved over a few other nights☆13Apr 11, 2019Updated 6 years ago
- EmPyre Web Interface☆12Mar 23, 2017Updated 9 years ago
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 10 years ago
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆12Aug 16, 2013Updated 12 years ago
- Pokémon Versioning☆11Jan 5, 2017Updated 9 years ago
- misc pentest tools.☆26Dec 16, 2014Updated 11 years ago
- Golang lib to interact with aircrack-ng (ABANDONNED)☆12Jul 12, 2019Updated 6 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Resizable contiguous sequence container with fast appends on either end.☆38Jan 28, 2017Updated 9 years ago
- A Powershell module including a couple of cmdlets for EWS Enum/Exploitation.☆19Aug 6, 2019Updated 6 years ago
- ☆18Mar 28, 2015Updated 10 years ago
- Simple asynchronous state machine providing hooks that are triggered when having reached a state.☆13Jun 16, 2024Updated last year
- TextMate support for C☆44Feb 3, 2022Updated 4 years ago
- Dumping ground for whatever IDA Pro scripts I write☆16Oct 9, 2016Updated 9 years ago
- A Firefox Extension to add CORS headers to responses.☆28Dec 4, 2012Updated 13 years ago
- Nash's Gore Mod: Vengeance Edition☆12Jun 14, 2023Updated 2 years ago
- Keylogger for Windows.☆221Jan 31, 2026Updated last month
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆12Aug 30, 2022Updated 3 years ago
- ☆16Jul 24, 2024Updated last year
- Repository for hacksummit Hackaton☆13Mar 8, 2016Updated 10 years ago
- The Elm architecture ported to Idris Programming language☆14Feb 27, 2019Updated 7 years ago
- An attempt to Linux Device Drivers and Kernel Programming☆30Aug 29, 2011Updated 14 years ago
- Python framework for extracting secret data from compression oracles such as those exploited by the BEAST and CRIME attacks.☆12Apr 22, 2015Updated 10 years ago
- Scripts and tools to automate a Windows 7 installation for QEMU☆14Nov 4, 2015Updated 10 years ago