lvrach / MiKeyLinks
MiKey is a minimal and modular Linux keylogger. It provides a toolkit that monitors and records all activities performed on a computer. It makes use of the Xlib.
☆14Updated 12 years ago
Alternatives and similar repositories for MiKey
Users that are interested in MiKey are comparing it to the libraries listed below
Sorting:
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- A security write-up about the Paypal API & data leakage☆25Updated 9 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 10 years ago
- Catfish is a tool used ease the process of finding ROP gadgets and creating payloads with them.☆30Updated 11 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 10 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 9 years ago
- Efficient clustering of MASSCAN results☆12Updated 9 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Updated 9 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 10 years ago
- Bash scripts to help setup port redirects with iptables☆16Updated 8 years ago
- CVE-2016-1287 vulnerability test☆16Updated 9 years ago
- A python script for obfuscating wireless networks☆79Updated 9 years ago
- PLASMA PULSAR☆70Updated 8 years ago
- Some exploits for ZeroNights 0x03☆36Updated 10 years ago
- A shellcode testing harness.☆70Updated last year
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 12 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- ssh session type for metasploit☆101Updated 3 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Updated 9 years ago
- Python Process Injection PoC Code from my SteelCon talk in 2014☆60Updated 11 years ago
- Exploit Reliability Testing System☆35Updated 10 years ago
- A shell / chat bot for XMPP and cloud services☆49Updated 10 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆59Updated 11 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 9 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆66Updated 10 years ago
- ~ BannerGrab☆25Updated 9 years ago
- Exploits and research stuffs☆54Updated 2 weeks ago