jeffbryner / pyKeylogger
python client/server keystroke logger
☆21Updated 12 years ago
Alternatives and similar repositories for pyKeylogger:
Users that are interested in pyKeylogger are comparing it to the libraries listed below
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- Extract useful information from a Twitter account.☆34Updated 11 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆16Updated 11 years ago
- An evolving hacking framework written in python☆11Updated 10 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 10 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- µphisher spear phishing tool (reference implementation)☆40Updated 4 years ago
- Exploit kit analyzer☆21Updated 10 years ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- ☆17Updated 10 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- Simple python script to detect meterpreter running in memory (hopefully)☆9Updated 10 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆13Updated 11 years ago
- Recursively searches a directory for any file containing a specified string☆45Updated 9 years ago
- A simple python script to dump data from memcached servers.☆11Updated 10 years ago
- ☆27Updated 7 years ago
- XMLRPC server for password cracking☆33Updated 10 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49Updated 7 years ago
- Volatility Plugin to scan for shimmed processes in Windows☆10Updated 9 years ago
- ☆16Updated 10 years ago
- Crawl certificate information from censys☆8Updated 8 years ago
- Data exfiltration PoC scripts☆24Updated 9 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- recon framework in ruby☆13Updated 13 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Updated 14 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Updated 11 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 9 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 11 years ago