mosca1337 / OSX-Keylogger
A simple key logger that is targeted for Mac OSX machines.
☆26Updated 11 years ago
Alternatives and similar repositories for OSX-Keylogger:
Users that are interested in OSX-Keylogger are comparing it to the libraries listed below
- Take full control of OSX as root via command line.☆48Updated 10 years ago
- Take full control of a OSX user or root account via command line.☆99Updated 6 years ago
- Powershell Reverse Rubber Ducky☆55Updated 9 years ago
- An auditing tool for Wi-Fi or wired Ethernet connections☆145Updated 10 years ago
- PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!☆252Updated 7 years ago
- Multi-mode wireless LAN Based on a Software Access point for Kali Linux.☆50Updated 6 years ago
- An Chat Program for use with the ToorCon 2013 badge.☆37Updated 9 years ago
- The TPLink WiFi Pineapple's web-interface☆89Updated 8 years ago
- Python plugin for Kismet to perform deauthentication to collect WPA2 handshakes☆93Updated 7 years ago
- Passive Vulnerability Auditor☆130Updated 8 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- A ctypes powered python keylogger.☆104Updated 5 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆167Updated 9 years ago
- WARCARRIER RF Scanning Terminal with Advanced Logging Features☆57Updated 6 years ago
- Useful pentesting scripts☆83Updated 7 years ago
- Inject beef hooks into HTTP traffic and track hooked systems from cmdline☆120Updated 9 years ago
- Pentest dropbox setup scripts for Kali Linux☆88Updated 8 years ago
- Python2 / BASH / VBS- UAC D&E Rubber Ducky☆60Updated 6 years ago
- Very simple keylogger for self-quantifying on Mac OS X☆169Updated 12 years ago
- Python script for decrypting stored images from Snapchat version 5.0.34.nn☆242Updated 3 years ago
- Script to help with installing and configuring Metasploit Framework, Armitage and the Plugins I have written on OSX and Linux☆25Updated 11 years ago
- Auto Reaver - multiple access point attack using Reaver☆53Updated 7 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆60Updated 9 years ago