A general Javascript keylogger to be used in an XSS PoC
☆19Feb 23, 2020Updated 6 years ago
Alternatives and similar repositories for XSS-Keylogger
Users that are interested in XSS-Keylogger are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cross-Site Scripting (XSS) vulnerability analyzer☆21Feb 13, 2026Updated 2 months ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- Simple RAT in C#☆27Apr 11, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Get a reverse shell within 15 seconds on both Windows or Unix based systems, using the Digispark developement board.☆43Dec 9, 2020Updated 5 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 5 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Dec 4, 2023Updated 2 years ago
- Simple script for web directory scanning☆33May 22, 2023Updated 2 years ago
- Flexible Penetrate Testing Auxiliary Suite☆73Jun 19, 2023Updated 2 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- A simple reverse shell in Nim langauge. It should bypass AV-s (don't submit binaries)☆16Oct 10, 2019Updated 6 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Sep 22, 2021Updated 4 years ago
- Passive subdomain enumeration tool with http-probe.☆32Apr 30, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Advanced python HTTP reverse shell made for Hacking Competition purpose. I am not responsible of what you do with this tool.☆24Aug 14, 2023Updated 2 years ago
- Burpsuite HTTP 插件,主要用于内网测试,可定制Content-Type和Response Content☆24Jul 2, 2018Updated 7 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- Web Recon & Exploitation Tool.☆56Mar 8, 2020Updated 6 years ago
- XXE Injection Payloads☆28Jul 30, 2019Updated 6 years ago
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- Scanning in the middlelayer, v2☆10Feb 18, 2026Updated last month
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Sep 8, 2025Updated 7 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A proof-of-concept Node.js ransomware☆21Mar 27, 2022Updated 4 years ago
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- Ransomware script based on AES-CBC (Fernet Token) and RSA (PKCS1-OAEP) cryptosystem.☆15Dec 3, 2022Updated 3 years ago
- Source code of https://blahcat.github.io☆13Oct 6, 2025Updated 6 months ago
- ☆102Jul 18, 2019Updated 6 years ago
- The program allows to download large data from shodan quickly, simply and avoid errors.☆29Nov 3, 2020Updated 5 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- ☆10Jul 28, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Simple backdoor for public places, that uses a file system for communication. Just for fun! 😈☆54Nov 27, 2019Updated 6 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Oct 11, 2021Updated 4 years ago
- Malduino compatible USB rubber ducky payloads☆14Jun 7, 2019Updated 6 years ago
- Subdomain Scan With Ping Method.☆46Dec 12, 2020Updated 5 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago
- A tool for recursively scanning websites for defacements☆10Nov 22, 2022Updated 3 years ago
- Decrypts and dumps Chrome-based browser cookies and passwords in Microsoft Windows.☆19Feb 11, 2026Updated 2 months ago