gsingh93 / simple-key-loggerLinks
A simple keylogger for Linux systems
☆116Updated 11 years ago
Alternatives and similar repositories for simple-key-logger
Users that are interested in simple-key-logger are comparing it to the libraries listed below
Sorting:
- Linux kernel mode debugfs keylogger☆676Updated 3 years ago
- A simple C keylogger for Linux☆70Updated 5 years ago
- 📝 ⌨️ A GNU/Linux keylogger that works!☆819Updated 6 months ago
- The tiny programs and scripts that don't deserve a project, but I still want to share.☆223Updated 6 years ago
- Hundreds of 20th Century viruses; clone this repository to upset your AV☆223Updated 3 years ago
- JynxKit2 is an LD_PRELOAD userland rootkit based on the original JynxKit. The backdoor has been replaced with an "accept()" system hook.☆181Updated 13 years ago
- Python reverse shell.☆297Updated 2 years ago
- An 802.11 WEP/WPA2 on-the-fly decrypter.☆141Updated 3 years ago
- A command-line network packet crafting and injection utility☆521Updated 2 years ago
- Various codes related to Ransomware Developement☆123Updated 8 years ago
- A keystroke / terminal logger for Linux.☆217Updated last year
- Devestating and awesome Linux X86_64 ELF Virus☆235Updated 3 years ago
- Source code from Hacking: The Art of Exploitation (Second Edition).☆451Updated 2 years ago
- Audio file steganography. Hides files or text inside audio files and retrieve them automatically☆293Updated 2 years ago
- My collection of useful code snippets/recipes/scripts/macros for my everyday tasks☆69Updated 5 years ago
- dsniff is a collection of tools for network auditing and penetration testing.☆223Updated 15 years ago
- Leaked Linux.Mirai Source Code for Research/IoC Development Purposes☆570Updated 8 years ago
- WannaCry Ransomware☆144Updated 8 years ago
- Automated DeAuth attack☆318Updated 2 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆469Updated last year
- The Hacker's Sandbox☆124Updated 9 months ago
- GNU MAC Changer☆670Updated 4 years ago
- Try to find the password of a LUKS encrypted volume.☆275Updated last year
- An Arch Linux repository for security professionals and enthusiasts. Done the Arch Way and optimized for i686, x86_64, ARMv6, ARMv7 and A…☆523Updated last year
- Collection of ancient computer virus source codes☆649Updated 4 years ago
- Pythonic ransomware proof of concept.☆220Updated 5 years ago
- A malicious captive wifi portal☆148Updated 5 years ago
- ASM Malicious code - PE infector☆72Updated 8 years ago
- Encrypted chat application in python☆56Updated 7 years ago
- simple shellcode generator☆114Updated 8 years ago