python client/server keystroke logger
☆23Oct 7, 2012Updated 13 years ago
Alternatives and similar repositories for pyKeylogger
Users that are interested in pyKeylogger are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆15Mar 2, 2014Updated 12 years ago
- ☆16Oct 23, 2015Updated 10 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 10 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22May 30, 2015Updated 10 years ago
- Automatically exported from code.google.com/p/verify-sigs☆18Sep 2, 2016Updated 9 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆30Sep 26, 2016Updated 9 years ago
- Simple keylogger for Windows with HTML output and FTP upload.☆33Dec 25, 2014Updated 11 years ago
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Nov 3, 2015Updated 10 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Jan 29, 2012Updated 14 years ago
- RatHole is a unix backdoor which compiles cleanly on standard linux and openbsd (probably other bsd flavours also) without addicional lib…☆37May 20, 2013Updated 12 years ago
- Search bing with python☆12Sep 25, 2014Updated 11 years ago
- Anti-Honeypot Demo (obsolete)☆18Jul 24, 2017Updated 8 years ago
- Android service that publishes user defined location names to a gmail account, based on the current WiFi network.☆14Feb 23, 2011Updated 15 years ago
- A simple script that scans a webserver for suspicious looking php files☆14Oct 31, 2014Updated 11 years ago
- A basic example of how to use Least Significant Bit steganography on a BMP image☆15Mar 16, 2023Updated 3 years ago
- Mass static malware analysis tool☆94Feb 13, 2022Updated 4 years ago
- Py class that returns fastest http proxy☆55Jan 3, 2019Updated 7 years ago
- Hide data in plaintext☆16Mar 25, 2019Updated 6 years ago
- DNS Sub-domain brute forcer, in Python + gevent☆50Dec 9, 2016Updated 9 years ago
- A simple TLS forwarder that lets you intercept traffic and play with them.☆29Apr 29, 2019Updated 6 years ago
- Memcache hacking tool.☆47Apr 20, 2017Updated 8 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆79Dec 11, 2015Updated 10 years ago
- Metasploit installer for Debian (Jessie) VPS.☆25Mar 22, 2017Updated 9 years ago
- ☆121Oct 6, 2015Updated 10 years ago
- Why hunt when you can seine?☆21May 12, 2015Updated 10 years ago
- DRDoS UDP amplification tool☆17Jul 2, 2015Updated 10 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Dec 18, 2016Updated 9 years ago
- A collection of post-exploitation tools for network red teaming.☆138Dec 7, 2018Updated 7 years ago
- Linux Application Firewall☆59May 23, 2020Updated 5 years ago
- ☆78May 24, 2018Updated 7 years ago
- Injected malicious code into legitimate andoid applications. Converted a keyboard app into a keylogger and an MP3 downloader into an imag…☆19Aug 8, 2014Updated 11 years ago
- Source code for 'Software Exorcism' by Bill Blunden☆13Mar 30, 2017Updated 8 years ago
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- A collection of tools mostly written in Python.☆15Feb 4, 2015Updated 11 years ago
- A fork of David B Heise's VirusTotal Powershell Module☆17Mar 14, 2022Updated 4 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Feb 8, 2019Updated 7 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- SSIDs for the Hak5 Wifi Pineapple's PineAP setup☆90Nov 23, 2021Updated 4 years ago