jarun / spyLinks
Linux kernel mode debugfs keylogger
☆673Updated 3 years ago
Alternatives and similar repositories for spy
Users that are interested in spy are comparing it to the libraries listed below
Sorting:
- A filesystem sandbox for Linux using syscall intercepts.☆404Updated 5 years ago
- A simple keylogger for Linux systems☆116Updated 11 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆969Updated 5 years ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆695Updated 3 years ago
- The dissection of a simple "hello world" ELF binary.☆466Updated 5 years ago
- A Linux packet crafting tool.☆472Updated 5 years ago
- << Silk Guardian >> is an anti-forensic kill-switch that waits for a change on your usb ports and then wipes your ram, deletes precious …☆719Updated last year
- Leaked Linux.Mirai Source Code for Research/IoC Development Purposes☆569Updated 8 years ago
- 📝 ⌨️ A GNU/Linux keylogger that works!☆816Updated 5 months ago
- Encrypted personal archives☆670Updated 5 months ago
- TorProxy is a tool which uses netfilter hooks in the linux kernel to route all network traffic through the Tor network☆166Updated 8 years ago
- Inline C/asm in Bash☆253Updated 8 years ago
- SSH man-in-the-middle tool☆1,730Updated 4 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆240Updated 8 years ago
- A Linux shell script to improve your privacy online☆86Updated 9 years ago
- A Bash utility for easy wan, lan, router, dns, mac address, and geolocation output, with clean stdout for piping☆233Updated 8 years ago
- Listen to Tux's heartbeat with this awesome Linux Kernel Module☆58Updated 7 years ago
- Check whether AMT is enabled and provisioned under Linux☆476Updated 7 years ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆672Updated 8 years ago
- like ~~grep~~ UBER, but for binaries☆1,758Updated this week
- BEURK Experimental Unix RootKit☆389Updated 8 years ago
- Perform network trace of a single process by using network namespaces.☆543Updated 3 months ago
- ☆352Updated 4 years ago
- All your IPs are belong to us.☆673Updated 7 years ago
- CJAG is an open-source implementation of our cache-based jamming agreement.☆285Updated 4 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆468Updated last year
- Linux rootkit for Ubuntu 16.04 and 10.04 (Linux Kernels 4.4.0 and 2.6.32), both i386 and amd64☆818Updated last year
- A ncurses animation to make decryption look like, well, decryption.☆244Updated 5 years ago
- A tool for manipulating X windows☆352Updated 5 years ago
- Commandline tool for searching and downloading files in LAN network, without any central server☆294Updated 5 years ago