jarun / spyLinks
Linux kernel mode debugfs keylogger
☆674Updated 3 years ago
Alternatives and similar repositories for spy
Users that are interested in spy are comparing it to the libraries listed below
Sorting:
- A filesystem sandbox for Linux using syscall intercepts.☆404Updated 5 years ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆697Updated 3 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆971Updated 5 years ago
- The dissection of a simple "hello world" ELF binary.☆466Updated 5 years ago
- A simple keylogger for Linux systems☆116Updated 11 years ago
- << Silk Guardian >> is an anti-forensic kill-switch that waits for a change on your usb ports and then wipes your ram, deletes precious …☆718Updated last year
- Some fun things you can do with kernel modules (all "bad ideas")☆440Updated 3 years ago
- Architectural privilege escalation on x86☆857Updated 7 years ago
- TorProxy is a tool which uses netfilter hooks in the linux kernel to route all network traffic through the Tor network☆166Updated 8 years ago
- A Linux packet crafting tool.☆471Updated 5 years ago
- Leaked Linux.Mirai Source Code for Research/IoC Development Purposes☆570Updated 8 years ago
- 📝 ⌨️ A GNU/Linux keylogger that works!☆817Updated 6 months ago
- Here I share the code of my CV, which is also a bootable bootloader :)☆524Updated 3 months ago
- Inline C/asm in Bash☆253Updated 8 years ago
- SSH man-in-the-middle tool☆1,732Updated 4 years ago
- peinjector - MITM PE file infector☆608Updated 9 years ago
- A list of all FTP servers in IPv4 that allow anonymous logins.☆657Updated 9 months ago
- Docker configuration for building Linux From Scratch system☆675Updated last year
- CJAG is an open-source implementation of our cache-based jamming agreement.☆285Updated 4 years ago
- An Arch Linux repository for security professionals and enthusiasts. Done the Arch Way and optimized for i686, x86_64, ARMv6, ARMv7 and A…☆520Updated last year
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆672Updated 8 years ago
- All your IPs are belong to us.☆676Updated 7 years ago
- like ~~grep~~ UBER, but for binaries☆1,760Updated 3 weeks ago
- ☆352Updated 4 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆240Updated 8 years ago
- Encrypted personal archives☆671Updated 6 months ago
- MOVED TO: https://cirosantilli.com/linux-kernel-module-cheat/userland-assembly with code at https://github.com/cirosantilli/linux-kernel-…☆889Updated 6 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆469Updated last year
- VirtualBox E1000 Guest-to-Host Escape☆1,420Updated 7 years ago
- The decompiled Morris Worm source code☆641Updated 5 years ago