jarun / spyLinks
Linux kernel mode debugfs keylogger
☆666Updated 3 years ago
Alternatives and similar repositories for spy
Users that are interested in spy are comparing it to the libraries listed below
Sorting:
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆955Updated 4 years ago
- A filesystem sandbox for Linux using syscall intercepts.☆402Updated 4 years ago
- Leaked Linux.Mirai Source Code for Research/IoC Development Purposes☆564Updated 8 years ago
- SSH man-in-the-middle tool☆1,664Updated 3 years ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆679Updated 3 years ago
- TorProxy is a tool which uses netfilter hooks in the linux kernel to route all network traffic through the Tor network☆165Updated 7 years ago
- A Linux packet crafting tool.☆468Updated 4 years ago
- A simple keylogger for Linux systems☆112Updated 10 years ago
- LLDB MCP Integration + other helpful commands☆728Updated 2 months ago
- powerful auto-backdooring utility☆747Updated 7 years ago
- Linux rootkit for Ubuntu 16.04 and 10.04 (Linux Kernels 4.4.0 and 2.6.32), both i386 and amd64☆804Updated last year
- peinjector - MITM PE file infector☆604Updated 9 years ago
- Some fun things you can do with kernel modules (all "bad ideas")☆440Updated 3 years ago
- DNS Exfiltration tool for stealthily sending files over DNS requests.☆1,700Updated 3 years ago
- Interactive shellcoding environment to easily craft shellcodes☆895Updated 4 years ago
- BEURK Experimental Unix RootKit☆382Updated 8 years ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆1,002Updated 3 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆312Updated 8 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆786Updated last year
- A tool to help you write binary exploits☆610Updated 6 years ago
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unpl…☆581Updated 7 years ago
- A command-line network packet crafting and injection utility☆515Updated last year
- All your IPs are belong to us.☆670Updated 7 years ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆657Updated 7 years ago
- << Silk Guardian >> is an anti-forensic kill-switch that waits for a change on your usb ports and then wipes your ram, deletes precious …☆704Updated last year
- OZ: a sandboxing system targeting everyday workstation applications☆437Updated 7 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,095Updated 6 years ago
- The engine that powers DeLorean!☆835Updated 5 years ago
- A tool for manipulating X windows☆353Updated 4 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,675Updated 5 years ago