Linux kernel mode debugfs keylogger
☆677Apr 15, 2022Updated 3 years ago
Alternatives and similar repositories for spy
Users that are interested in spy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple LKM linux kernel rootkit (x86 / x86_64)☆24Jun 16, 2020Updated 5 years ago
- Fast batch image resizer and rotator☆1,087Feb 22, 2026Updated last month
- BEURK Experimental Unix RootKit☆390Apr 28, 2017Updated 8 years ago
- Bits, bytes and general-purpose calculator☆688Mar 27, 2026Updated 2 weeks ago
- HORSEPILL rootkit PoC☆234Aug 5, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A library of "connected" data structures☆131Sep 10, 2023Updated 2 years ago
- Some fun programs and snippets I wrote☆16Mar 29, 2017Updated 9 years ago
- Linux v4.x.x Rootkit☆92Jul 27, 2024Updated last year
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆977Dec 11, 2020Updated 5 years ago
- Linux rootkit for Ubuntu 16.04 and 10.04 (Linux Kernels 4.4.0 and 2.6.32), both i386 and amd64☆818Apr 7, 2024Updated 2 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆807Mar 7, 2024Updated 2 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Dec 15, 2012Updated 13 years ago
- kfile-over-icmp is an LKM for stealth sending of files over ICMP communication.☆18Oct 9, 2020Updated 5 years ago
- linux rootkit☆162Feb 12, 2018Updated 8 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- This is a linux rootkit using many of the techniques described on☆167Oct 22, 2019Updated 6 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Sep 10, 2013Updated 12 years ago
- runtime code injector for Linux☆26May 29, 2011Updated 14 years ago
- awesome-linux-rootkits☆2,055Feb 15, 2026Updated last month
- Small Backdoor/rootkit for linux kernel☆21Jan 26, 2014Updated 12 years ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆676Nov 21, 2017Updated 8 years ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,497Feb 27, 2018Updated 8 years ago
- Personal mini-web in text☆7,104Mar 27, 2026Updated 2 weeks ago
- LibZeroEvil & the Research Rootkit project.☆599Dec 1, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Transparently tunnel your IP traffic through ICMP echo and reply packets.☆3,245Apr 12, 2022Updated 4 years ago
- n³ The unorthodox terminal file manager☆21,452Apr 5, 2026Updated last week
- Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to.☆7,325Jul 27, 2021Updated 4 years ago
- A book-in-progress about the Linux kernel and its insides.☆32,370Apr 4, 2026Updated last week
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)☆2,288Mar 10, 2026Updated last month
- GPU keylogger PoC by Team Jellyfish☆28Aug 15, 2023Updated 2 years ago
- Exploitation Framework for Embedded Devices☆13,066Mar 2, 2026Updated last month
- Take pictures of eavesdroppers.☆31Jul 6, 2016Updated 9 years ago
- The Horrific Omnipotent Rootkit☆24Mar 17, 2017Updated 9 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- UNIX-like reverse engineering framework and command-line toolset☆23,397Updated this week
- ld_preload userland rootkit☆35Dec 13, 2020Updated 5 years ago
- A little Keylogger for Windows developed in C++☆20Jan 24, 2016Updated 10 years ago
- kprochide is an LKM for hiding processes from the userland. The module is able to hide multiple processes and is able to dynamically rece…☆23Oct 9, 2020Updated 5 years ago
- Google from the terminal☆6,186Nov 13, 2021Updated 4 years ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆703May 13, 2022Updated 3 years ago
- Tiny date, time diff calculator with piggybacked timers☆405Feb 22, 2026Updated last month