gilmansharov / Keylogger
with encryption, file reading, screenshots and email sending
☆9Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for Keylogger
- pure python remote adb scanner + nmap scan module☆21Updated 5 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 6 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆24Updated 6 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆11Updated 7 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- ☆24Updated 6 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆21Updated 6 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆27Updated 5 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆41Updated 6 years ago
- Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit f…☆28Updated 5 years ago
- A botnet (C&C) framework that create in bash and using crontab for periodic execute☆11Updated 7 years ago
- javascript botnet browser V3 based one Cloud 9 Botnet and my botnet browser chrome. capture any web site,virtual clavier ,paypal,facebook…☆9Updated 4 years ago
- Access windows machine remotely on HTTP☆12Updated 4 years ago
- edge --> powerpoint --> remote-file --> shell☆13Updated 5 years ago
- An analysis on cryptocurrency mining malware embedded via JavaScript.☆12Updated 6 years ago
- Files related to my training classes☆15Updated 3 years ago
- HEVD exploits☆9Updated 5 years ago
- Random stuff☆16Updated 6 years ago
- Carbanak source code leak.☆9Updated 6 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 8 years ago
- Some of the vulnerabilities that were found by Cybellum platform☆32Updated 6 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆16Updated 7 years ago
- ransomware chiffre tous les fichiers,télécharge une image depuis un serveur distant puis change le fond d'ecran après le chiffrement des …☆25Updated 3 years ago
- Collection of cracked malware☆14Updated 5 years ago
- Various Crypter Project☆9Updated 10 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago