This is a stealthier version of Keylogger-lkm, it introduces hiding techniques and also a command entering option.
☆13Jan 27, 2023Updated 3 years ago
Alternatives and similar repositories for stealthy-Keylogger-lkm
Users that are interested in stealthy-Keylogger-lkm are comparing it to the libraries listed below
Sorting:
- This is a very simple Keylogger, it doesn't hide itself and is a college project building towards developing a rootkit.☆23Apr 14, 2014Updated 11 years ago
- perform a static stateless 2-way NAT with iptables☆14Dec 27, 2014Updated 11 years ago
- Sockstress (CVE-2008-4609) DDoS implementation written in Go☆17Jul 2, 2016Updated 9 years ago
- Fork from http://redmine.poppopret.org/projects/suterusu. An LKM rootkit targeting Linux 2.6/3.x on x86 and ARM. Supports privilege esca…☆33Sep 6, 2012Updated 13 years ago
- "Polymorphic" shellcode generator (x86)☆26Oct 28, 2014Updated 11 years ago
- A Unix rootkit☆17Aug 9, 2020Updated 5 years ago
- Loki PWS - Control Panel New Version leaked☆22Aug 9, 2018Updated 7 years ago
- Basic Auth Phish page☆25Sep 11, 2017Updated 8 years ago
- A simple PDF summarizer with Node.js and groq-sdk☆11Jan 11, 2025Updated last year
- A tool for manipulating Call of Duty savegames.☆11May 7, 2017Updated 8 years ago
- ☆20Aug 6, 2025Updated 7 months ago
- Herramienta para realizar fuerza bruta a diferentes servicios.☆10Sep 13, 2021Updated 4 years ago
- Config files for my GitHub profile.☆13Jan 16, 2024Updated 2 years ago
- BDResource Technology Co.,Ltd, engaged in making auto electrical diagnostic tools, such as X431,GM tech2,TMS374,Star 2000 Diagnostic Syst…☆15Oct 18, 2012Updated 13 years ago
- ☆30May 29, 2025Updated 9 months ago
- 课程设计:C语言爬虫☆10Jul 8, 2018Updated 7 years ago
- ☆18May 11, 2021Updated 4 years ago
- This repository is dedicated to the SOC (Security Operations Center) Analyst course. It contains all the necessary resources, notes, scri…☆16Aug 31, 2024Updated last year
- Decompiled source code of GhostCtrl. It’s not the original source code☆10Jul 26, 2017Updated 8 years ago
- ☆11Oct 14, 2020Updated 5 years ago
- A tool programmed to shorten links/mask links☆11Oct 17, 2021Updated 4 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- arp-poison (aka arp spoof) tool☆41Apr 9, 2013Updated 12 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Feb 26, 2016Updated 10 years ago
- ☆11May 19, 2016Updated 9 years ago
- Linux kernel for Qualcomm's Hexagon processors☆10Mar 14, 2013Updated 12 years ago
- ☆12Jul 7, 2014Updated 11 years ago
- Hex encode & decode a string, right from your terminal.☆10Jan 5, 2023Updated 3 years ago
- Common Proprietary Qualcomm Binaries☆10Dec 26, 2016Updated 9 years ago
- ☆10Mar 7, 2020Updated 6 years ago
- An Internet Relay Chat server in C++ 98☆11May 20, 2022Updated 3 years ago
- Collect and filter location information from social network services.☆11Jun 14, 2020Updated 5 years ago
- Unlock your Netgear EX2700☆10Oct 31, 2016Updated 9 years ago
- PHP wrapper functions for interfacing with the Nessus V6.x API☆15Feb 14, 2017Updated 9 years ago
- API for data transmission and retrieval from Monero applications through the Microsoft .NET Framework☆10Jan 16, 2017Updated 9 years ago
- Alcatel-Lucent SR/OS (TiMOS) Firmware Packer☆11May 31, 2017Updated 8 years ago
- Send automatic reports to Instagram 😪☆11Sep 13, 2021Updated 4 years ago
- exploit of smt proxyoverflow bug, i.e. CVE-2018–10376☆10May 4, 2018Updated 7 years ago
- Create a netfilter queue and display packets passing through. Can also save those packets to a pcap file.☆13Dec 3, 2011Updated 14 years ago