maK- / stealthy-Keylogger-lkmLinks
This is a stealthier version of Keylogger-lkm, it introduces hiding techniques and also a command entering option.
☆13Updated 2 years ago
Alternatives and similar repositories for stealthy-Keylogger-lkm
Users that are interested in stealthy-Keylogger-lkm are comparing it to the libraries listed below
Sorting:
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- SQL Injection without the pain of syringes.☆25Updated 8 years ago
- This is a very simple Keylogger, it doesn't hide itself and is a college project building towards developing a rootkit.☆22Updated 11 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 10 years ago
- "Polymorphic" shellcode generator (x86)☆23Updated 10 years ago
- 0x88 exploit pack Decoded☆28Updated 11 years ago
- runtime code injector for Linux☆27Updated 14 years ago
- An educational Linux Kernel Rootkit☆33Updated 3 years ago
- A Unix rootkit☆17Updated 5 years ago
- HexInject is a very versatile packet injector and sniffer, that provide a command-line framework for raw network access.☆22Updated 8 years ago
- The Horrific Omnipotent Rootkit☆22Updated 8 years ago
- Port scanning and domain utility.☆30Updated 8 years ago
- Collection of Nmap scripts☆10Updated 9 years ago
- A rootkit for linux kernel >= 3.0☆19Updated 11 years ago
- Local enumeration and exploitation framework.☆18Updated 8 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 9 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 9 years ago
- A collection of shellcodes☆69Updated 13 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆40Updated 9 years ago
- Bash scripts to help setup port redirects with iptables☆16Updated 8 years ago
- an experimental linux kernel module (rootkit) with a keylogger and built-in IRC bot☆56Updated 10 years ago
- ☆28Updated 8 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- Generate customized and undetectable exploits for Metasploit.☆23Updated 8 years ago
- ☆15Updated 8 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- Popping boxes with Nmap☆18Updated 13 years ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.☆17Updated 7 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30Updated 9 years ago