killswitch-GUI / SetWindowsHookEx-Keylogger
Windows C++ Native Keylogger using SetWindowsHookEx
☆66Updated 5 years ago
Alternatives and similar repositories for SetWindowsHookEx-Keylogger:
Users that are interested in SetWindowsHookEx-Keylogger are comparing it to the libraries listed below
- A Win32 PE/Executable Crypter that employs on the fly encryption & decryption of memory☆33Updated 11 years ago
- A simple rootkit to hide a process☆46Updated 11 years ago
- Various Crypter Project☆51Updated 11 years ago
- Blog posts☆30Updated 4 years ago
- Demo service that runs in svchost.exe☆79Updated 7 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆43Updated 7 months ago
- A small library helping to parse commandline parameters (for C/C++)☆57Updated last year
- PoC designed to evade userland-hooking anti-virus.☆88Updated 5 years ago
- Protects deletion of files with a specified extension using a kernel-mode driver.☆75Updated 6 years ago
- ☆39Updated 7 years ago
- Simple PE Packer Which Encrypts .text Section☆50Updated 7 years ago
- Gozi-MBR-rootkit Bootkit Modified☆68Updated 8 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 7 years ago
- Ammyy v3 Source Code leak , with ❤️ <3☆37Updated 8 years ago
- Hollow Process / Dynamic Forking / RunPE injection technique implemented in Python☆53Updated 3 years ago
- A MITM proxy server for reflective DLL injection through WinINet☆15Updated 7 years ago
- DLL Injection Library & Tools☆72Updated 8 years ago
- Analyze and attack windows applications using dll hijacking vulnerabilities☆56Updated 5 years ago
- C++☆80Updated 8 years ago
- Code Injection technique written in cpp language☆31Updated 7 years ago
- Proof of concept memory anti-forensic toolkit designed for hiding various artifacts inside the memory dump during memory acquisition on M…☆11Updated 5 years ago
- Bypass antivirus with dynamic import. Hide the api(s) used.☆26Updated 9 years ago
- Hidden kernel mode code execution for bypassing modern anti-rootkits.☆83Updated 14 years ago
- This is a demo project to illustrate the way to verify and restore original SST in case of some malware hooks☆33Updated 8 years ago
- Simple proof of concept code for injecting libraries on 64bit processes from a 32bit process☆94Updated 6 years ago
- ☆13Updated 8 years ago
- Reflective DLL that hooks the creation of the UAC prompt popped by explorer.exe for privilege escalation.☆21Updated 4 years ago
- A minimal tool to extract shellcode from 64-bit PE binaries.☆50Updated 3 years ago
- 💉 A tool that allows shellcode injection into another process's memory space. It works for both Windows x64 and x86 systems.☆11Updated 5 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆44Updated 7 years ago