jeffbryner / pyKeyloggerLinks
python client/server keystroke logger
☆21Updated 12 years ago
Alternatives and similar repositories for pyKeylogger
Users that are interested in pyKeylogger are comparing it to the libraries listed below
Sorting:
- µphisher spear phishing tool (reference implementation)☆40Updated 4 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆16Updated 11 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- Extract useful information from a Twitter account.☆34Updated 11 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- ☆27Updated 7 years ago
- ☆17Updated 10 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 9 years ago
- ☆16Updated 10 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆48Updated 8 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 10 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Updated 8 years ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆18Updated 9 years ago
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆29Updated 11 years ago
- A framework for creating modular bots/backdoors☆21Updated 9 years ago
- An evolving hacking framework written in python☆11Updated 10 years ago
- The Horrific Omnipotent Rootkit☆22Updated 8 years ago
- A collection of tools mostly written in Python.☆15Updated 10 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Updated 8 years ago
- Recursively searches a directory for any file containing a specified string☆45Updated 9 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 9 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Updated 11 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆9Updated 9 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆24Updated 4 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- Tools for use with phishing frenzy☆11Updated 6 years ago
- recon framework in ruby☆13Updated 13 years ago