kernc / logkeysLinks
š āØļø A GNU/Linux keylogger that works!
ā809Updated 3 months ago
Alternatives and similar repositories for logkeys
Users that are interested in logkeys are comparing it to the libraries listed below
Sorting:
- A simple keylogger for Linux systemsā116Updated 11 years ago
- Keylogger for Windows.ā218Updated 2 weeks ago
- Linux kernel mode debugfs keyloggerā675Updated 3 years ago
- An Arch Linux repository for security professionals and enthusiasts. Done the Arch Way and optimized for i686, x86_64, ARMv6, ARMv7 and Aā¦ā513Updated last year
- GNU MAC Changerā654Updated 4 years ago
- Library to torify application - NOTE: upstream has been moved to https://gitweb.torproject.org/torsocks.gitā549Updated 3 years ago
- netdiscoverā403Updated 3 years ago
- All releases of the security research group (a.k.a. hackers) The Hacker's Choiceā734Updated 2 months ago
- A simple keylogger for Windows, Linux and Macā2,304Updated 3 months ago
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)ā870Updated 6 years ago
- Python logger with multiple features.ā528Updated 4 years ago
- Driftnet watches network traffic, and picks out and displays JPEG and GIF images for displayā460Updated 6 months ago
- IP obfuscator made to make a malicious ip a bit cuterā546Updated last year
- A simple, fully python ransomware PoCā376Updated 5 years ago
- Framework for building Windows malware, written in C++ā533Updated 9 months ago
- Use a Fake image.jpg to exploit targets (hide known file extensions)ā926Updated 5 months ago
- Linux rootkit for Ubuntu 16.04 and 10.04 (Linux Kernels 4.4.0 and 2.6.32), both i386 and amd64ā817Updated last year
- ransomware open-sourcesā786Updated 5 years ago
- Automatically exported from code.google.com/p/armitageā558Updated 4 years ago
- Leaked Linux.Mirai Source Code for Research/IoC Development Purposesā565Updated 8 years ago
- SSH man-in-the-middle toolā1,723Updated 4 years ago
- Mirror of Shadowbrokers release from https://steemit.com/shadowbrokers/@theshadowbrokers/lost-in-translationā477Updated 8 years ago
- A framework for layer 2 attacksā805Updated 2 years ago
- Python Remote Administration Tool (RAT) to gain meterpreter sessionā633Updated last year
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Sā¦ā1,637Updated 4 years ago
- Fake sshd that logs ip addresses, usernames, and passwords.ā666Updated last year
- A braindead program for cracking encrypted ZIP archives. Forked from http://oldhome.schmorp.de/marc/fcrackzip.htmlā458Updated 2 years ago
- A POC Windows crypto-ransomware (Academic). Now Ransom:Win32/MauriCrypt.MK!MTBā939Updated 6 years ago
- Audio file steganography. Hides files or text inside audio files and retrieve them automaticallyā292Updated 2 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricksā1,429Updated 7 years ago