jarun / spyLinks
Linux kernel mode debugfs keylogger
☆674Updated 3 years ago
Alternatives and similar repositories for spy
Users that are interested in spy are comparing it to the libraries listed below
Sorting:
- A filesystem sandbox for Linux using syscall intercepts.☆404Updated 5 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆971Updated 5 years ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆697Updated 3 years ago
- A simple keylogger for Linux systems☆116Updated 11 years ago
- The dissection of a simple "hello world" ELF binary.☆467Updated 5 years ago
- TorProxy is a tool which uses netfilter hooks in the linux kernel to route all network traffic through the Tor network☆166Updated 8 years ago
- SSH man-in-the-middle tool☆1,732Updated 4 years ago
- 📝 ⌨️ A GNU/Linux keylogger that works!☆819Updated 6 months ago
- << Silk Guardian >> is an anti-forensic kill-switch that waits for a change on your usb ports and then wipes your ram, deletes precious …☆719Updated 2 years ago
- A Linux packet crafting tool.☆471Updated 5 years ago
- Inline C/asm in Bash☆253Updated 8 years ago
- Listen to Tux's heartbeat with this awesome Linux Kernel Module☆58Updated 7 years ago
- A Bash utility for easy wan, lan, router, dns, mac address, and geolocation output, with clean stdout for piping☆233Updated 8 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆240Updated 8 years ago
- CJAG is an open-source implementation of our cache-based jamming agreement.☆285Updated 4 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆313Updated 9 years ago
- Check whether AMT is enabled and provisioned under Linux☆476Updated 7 years ago
- Leaked Linux.Mirai Source Code for Research/IoC Development Purposes☆570Updated 8 years ago
- Encrypted personal archives☆672Updated 6 months ago
- Utility for injecting executable code into a running process on x86/x64 Linux☆269Updated 9 years ago
- We're insanely passionate about command line asm documentation in the cloud, and we're crushing it!☆383Updated 5 years ago
- Dead simple LAN file transfers from the command line☆406Updated 4 years ago
- A Linux shell script to improve your privacy online☆86Updated 10 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆808Updated last year
- OZ: a sandboxing system targeting everyday workstation applications☆440Updated 7 years ago
- Educational virus written in Assembly that infects 32-bit ELF executables on Linux using the data segment infection method☆79Updated 9 years ago
- The Witchcraft Compiler Collection☆1,971Updated 4 months ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆672Updated 8 years ago
- All your IPs are belong to us.☆676Updated 7 years ago
- Trace And Rewrite Delays In Syscalls: Hooking time-related Linux syscalls to warp a process's perspective of time, using ptrace.☆160Updated last year