Network aware keylogger: broadcasting on your local area network.
☆22Jul 29, 2013Updated 12 years ago
Alternatives and similar repositories for Hotel-kilo
Users that are interested in Hotel-kilo are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Jan 29, 2012Updated 14 years ago
- A password cracking IRC bot☆18May 24, 2014Updated 11 years ago
- Command line client for cattle☆17Feb 7, 2019Updated 7 years ago
- SecuritySpy - Messages.app and iMessage Integration☆13Nov 5, 2019Updated 6 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Spy the messages from a iDevice with or without passcode.☆18Apr 19, 2022Updated 3 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- A fuzzing script for MitmProxy☆25May 15, 2015Updated 10 years ago
- Network Finger Printer☆16Nov 10, 2017Updated 8 years ago
- Hardware keylogger dongle with built-in Wi-Fi for live keystroke capture/injection and other fun stuff☆21May 13, 2016Updated 9 years ago
- A web service that monitors remote devices using libcurl☆22Jan 31, 2012Updated 14 years ago
- strace keylogger PoC☆44Apr 9, 2018Updated 7 years ago
- Passphrase entry utility that aims to defeat hardware keyloggers and low-resolution spy cameras☆25Oct 21, 2017Updated 8 years ago
- Easily inject code into OS X apps☆63Oct 1, 2013Updated 12 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- LD_PRELOAD rootkit☆24Oct 12, 2014Updated 11 years ago
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- Record and playback a terminal session☆15Feb 4, 2013Updated 13 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Dec 8, 2022Updated 3 years ago
- Visualize an ELF's execution☆11Dec 28, 2014Updated 11 years ago
- A tool for patching/injecting code into elf binaries.☆14Sep 27, 2012Updated 13 years ago
- Network Keylogger is an open source program that sends every key pressed in a computer to another computer, via TCP/IP. It can be used to…☆41Apr 25, 2011Updated 14 years ago
- ☆15Aug 13, 2014Updated 11 years ago
- A Go parser for the /etc/passwd file☆21Feb 14, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A simple reverse ssh/proxy implant PoC for *nix systems.☆57Jul 5, 2024Updated last year
- Some yara rules and tools☆16Feb 12, 2014Updated 12 years ago
- Reverse HTTP shell with basic ARC4 encryption support☆12Dec 28, 2015Updated 10 years ago
- Shellcode process injector☆28May 22, 2020Updated 5 years ago
- Python script for querying the apple servers for the location of wifi access points☆14May 31, 2024Updated last year
- An image to Ascii converter written in Python☆23May 24, 2014Updated 11 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Oct 1, 2021Updated 4 years ago
- Spark In Console - Cisco (WebEx)Spark Client for Linux/MacOS☆23Jun 28, 2018Updated 7 years ago
- Reverseshell Generator☆10Dec 13, 2017Updated 8 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 11 years ago
- Enabling 2fac confirmation for newly connected USB devices☆45Aug 4, 2016Updated 9 years ago
- Convert internet traffic to music.☆23Feb 22, 2014Updated 12 years ago
- Some helper tools for network pentest☆20Oct 2, 2013Updated 12 years ago
- Evil Linux kernel module that hooks sys_read system call and lets a user get a reverse shell or execute shellcode in the kernel.☆15Mar 12, 2022Updated 4 years ago
- Provides access to libhashcat☆31Apr 6, 2024Updated last year