gianlucag / KeyloggerLinks
Minimal keylogger written in C, remote upload of keystrokes and screen snapshots!
☆27Updated 8 years ago
Alternatives and similar repositories for Keylogger
Users that are interested in Keylogger are comparing it to the libraries listed below
Sorting:
- The source code of the Zeus Evolution botnet that used TOR.☆61Updated 8 years ago
- Better Remote Access Trojan☆51Updated 8 years ago
- Zero-Day Code Injection and Persistence Technique☆29Updated 8 years ago
- Various Crypter Project☆54Updated 11 years ago
- Simple Remote Access Trojan☆24Updated 8 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 9 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆46Updated 7 years ago
- Ransomeware☆47Updated 8 years ago
- arp-poison (aka arp spoof) tool☆40Updated 12 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆30Updated 4 years ago
- Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit f…☆30Updated 7 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 8 years ago
- HTTP botnet☆62Updated 9 years ago
- Malicious Software SRC Extract☆75Updated 8 years ago
- Virus RAT v8.0 Beta☆27Updated 8 years ago
- Mass malicious script dump/Malware src dump☆57Updated 8 years ago
- Power Loader botnet☆42Updated 10 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆50Updated 6 years ago
- ☆25Updated 13 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Updated 10 years ago
- XOR encryption, malware crypter☆96Updated 11 years ago
- Example Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic leve…☆70Updated 6 years ago
- Bind 2 exe's and have them run at the same time.☆48Updated 11 years ago
- Plog - A simple and powerful keylogger !☆11Updated 7 years ago
- Athena Botnet Source Code☆156Updated 10 years ago
- Personal collection of Remote Administration Tool sources. Dedicated for Ax0nes Forum at Ax0nes.com for education purpose☆81Updated 7 years ago
- Alina Spark - Point of Sales Trojan☆48Updated 10 years ago
- SideEffect Keylogger☆13Updated 8 years ago
- Mutation Of Vıruses☆48Updated 10 years ago
- some python3 functions to add spreading features to any python backdoor☆55Updated 8 years ago