jarun / spy
Linux kernel mode debugfs keylogger
☆655Updated 2 years ago
Alternatives and similar repositories for spy:
Users that are interested in spy are comparing it to the libraries listed below
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆955Updated 4 years ago
- A filesystem sandbox for Linux using syscall intercepts.☆402Updated 4 years ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆674Updated 2 years ago
- TorProxy is a tool which uses netfilter hooks in the linux kernel to route all network traffic through the Tor network☆165Updated 7 years ago
- powerful auto-backdooring utility☆746Updated 7 years ago
- A Linux packet crafting tool.☆468Updated 4 years ago
- Some fun things you can do with kernel modules (all "bad ideas")☆440Updated 2 years ago
- The dissection of a simple "hello world" ELF binary.☆461Updated 4 years ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆650Updated 7 years ago
- Trace And Rewrite Delays In Syscalls: Hooking time-related Linux syscalls to warp a process's perspective of time, using ptrace.☆160Updated 11 months ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆464Updated 8 months ago
- Linux rootkit for Ubuntu 16.04 and 10.04 (Linux Kernels 4.4.0 and 2.6.32), both i386 and amd64☆793Updated 11 months ago
- Leaked Linux.Mirai Source Code for Research/IoC Development Purposes☆559Updated 8 years ago
- All your IPs are belong to us.☆668Updated 6 years ago
- Interactive shellcoding environment to easily craft shellcodes☆894Updated 4 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,666Updated 5 years ago
- Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA. The tool can attack over FireWire, Thunderbolt, Ex…☆1,584Updated last year
- Architectural privilege escalation on x86☆853Updated 7 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆783Updated last year
- A GNU/Linux keylogger that works!☆779Updated 2 years ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆996Updated 3 years ago
- SSH man-in-the-middle tool☆1,652Updated 3 years ago
- A simple keylogger for Linux systems☆107Updated 10 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆311Updated 8 years ago
- DNS Exfiltration tool for stealthily sending files over DNS requests.☆1,693Updated 3 years ago
- A linux-based assembly REPL for x86, amd64, armv7, and armv8☆1,189Updated last year
- A tool to help you write binary exploits☆609Updated 6 years ago
- like ~~grep~~ UBER, but for binaries☆1,727Updated 2 years ago
- CJAG is an open-source implementation of our cache-based jamming agreement.☆282Updated 3 years ago
- SSHPry v2 - Spy & Control os SSH Connected client's TTY☆398Updated 7 years ago