maK- / stealthy-Keylogger-lkmLinks
This is a stealthier version of Keylogger-lkm, it introduces hiding techniques and also a command entering option.
☆13Updated 2 years ago
Alternatives and similar repositories for stealthy-Keylogger-lkm
Users that are interested in stealthy-Keylogger-lkm are comparing it to the libraries listed below
Sorting:
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- "Polymorphic" shellcode generator (x86)☆25Updated 11 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 10 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- A rootkit for linux kernel >= 3.0☆19Updated 11 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago
- All tools you needed during penetration testing.☆18Updated 8 years ago
- 0x88 exploit pack Decoded☆27Updated 11 years ago
- Local enumeration and exploitation framework.☆18Updated 8 years ago
- This is a very simple Keylogger, it doesn't hide itself and is a college project building towards developing a rootkit.☆23Updated 11 years ago
- SQL Injection without the pain of syringes.☆25Updated 8 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆13Updated 12 years ago
- runtime code injector for Linux☆27Updated 14 years ago
- LD_PRELOAD rootkit☆24Updated 11 years ago
- The Horrific Omnipotent Rootkit☆23Updated 8 years ago
- an experimental linux kernel module (rootkit) with a keylogger and built-in IRC bot☆57Updated 10 years ago
- An educational Linux Kernel Rootkit☆33Updated 4 years ago
- ☆16Updated 9 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 10 years ago
- ☆28Updated 9 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 8 years ago
- An ELF parasite command injector.☆34Updated 8 years ago
- ☆65Updated 9 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Updated 10 years ago
- Port scanning and domain utility.☆29Updated 8 years ago
- A Unix rootkit☆16Updated 5 years ago
- Get a list of installed software in a safe manner☆11Updated 8 years ago
- collection of useful shells for penetration tests☆37Updated 8 years ago
- The third open source piece of ransomware using bash☆15Updated 10 years ago