gianlucag / Keylogger
Minimal keylogger written in C, remote upload of keystrokes and screen snapshots!
☆28Updated 7 years ago
Alternatives and similar repositories for Keylogger
Users that are interested in Keylogger are comparing it to the libraries listed below
Sorting:
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago
- Capstone: Keylogger Trojan☆35Updated 6 years ago
- Ransomeware☆47Updated 7 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- Alina Spark - Point of Sales Trojan☆48Updated 10 years ago
- Better Remote Access Trojan☆49Updated 8 years ago
- C++/C botnet using HTTP C&C☆15Updated 10 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆50Updated 8 years ago
- A Python program that scans RAM.☆39Updated 10 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆44Updated 7 years ago
- Plog - A simple and powerful keylogger !☆11Updated 6 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆59Updated 8 years ago
- Zero-Day Code Injection and Persistence Technique☆26Updated 8 years ago
- "Polymorphic" shellcode generator (x86)☆23Updated 10 years ago
- BlackWorm SRC Extract☆16Updated 8 years ago
- Mutation Of Vıruses☆50Updated 9 years ago
- Access windows machine remotely on HTTP☆12Updated 4 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 8 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆28Updated 4 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Updated 5 years ago
- HTTP botnet☆61Updated 8 years ago
- Simple Remote Access Trojan☆21Updated 8 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android) Remote Administration Tool with an embedded Python interpreter.☆15Updated 9 years ago
- Generate customized and undetectable exploits for Metasploit.☆24Updated 7 years ago
- Malicious Software SRC Extract☆74Updated 8 years ago
- Simple runtime crypter in C++.☆44Updated 10 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆26Updated 8 years ago
- Random stuff☆16Updated 6 years ago
- Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit f…☆29Updated 6 years ago