kernc / logkeysLinks
A GNU/Linux keylogger that works!
☆798Updated 2 weeks ago
Alternatives and similar repositories for logkeys
Users that are interested in logkeys are comparing it to the libraries listed below
Sorting:
- Linux kernel mode debugfs keylogger☆667Updated 3 years ago
- A simple keylogger for Linux systems☆114Updated 11 years ago
- An Arch Linux repository for security professionals and enthusiasts. Done the Arch Way and optimized for i686, x86_64, ARMv6, ARMv7 and A…☆511Updated last year
- A simple keylogger for Windows, Linux and Mac☆2,266Updated this week
- GNU MAC Changer☆644Updated 3 years ago
- Keylogger for Windows.☆216Updated 3 months ago
- netdiscover☆396Updated 2 years ago
- Library to torify application - NOTE: upstream has been moved to https://gitweb.torproject.org/torsocks.git☆538Updated 3 years ago
- Fake sshd that logs ip addresses, usernames, and passwords.☆654Updated 9 months ago
- SSH man-in-the-middle tool☆1,680Updated 4 years ago
- Xenotix Python Keylogger for Windows.☆456Updated 6 years ago
- << Silk Guardian >> is an anti-forensic kill-switch that waits for a change on your usb ports and then wipes your ram, deletes precious …☆706Updated last year
- Python logger with multiple features.☆527Updated 4 years ago
- Linux rootkit for Ubuntu 16.04 and 10.04 (Linux Kernels 4.4.0 and 2.6.32), both i386 and amd64☆804Updated last year
- Python botnet and backdoor☆1,596Updated 2 years ago
- powerful auto-backdooring utility☆748Updated 7 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,618Updated 4 years ago
- Module of Metasploit to exploit the vulnerability Eternalblue-Doublepulsar.☆1,125Updated 4 years ago
- A simple, fully python ransomware PoC☆377Updated 5 years ago
- All releases of the security research group (a.k.a. hackers) The Hacker's Choice☆726Updated 2 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,677Updated 5 years ago
- Automatically exported from code.google.com/p/armitage☆550Updated 3 years ago
- A fully featured Windows backdoor that uses Gmail as a C&C server☆504Updated 6 years ago
- Evil Twin Attack Bash script☆568Updated 9 years ago
- A framework for layer 2 attacks☆788Updated last year
- NSA finest tool☆985Updated 8 years ago
- transform your payload.exe into one fake word doc (.ppt)☆468Updated 5 years ago
- Sample Rootkit for Linux☆399Updated last year
- NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. This repository is for study purposes only, do not message me about…☆1,503Updated 4 years ago
- IP obfuscator made to make a malicious ip a bit cuter☆548Updated 9 months ago