A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.
☆12Oct 10, 2015Updated 10 years ago
Alternatives and similar repositories for securelog
Users that are interested in securelog are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- The Horrific Omnipotent Rootkit☆23Mar 17, 2017Updated 9 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 9 years ago
- Various tools, exploits and other short code snippets☆12Dec 25, 2018Updated 7 years ago
- Cross-Qt compatibility module for IDAPython.☆13Oct 2, 2019Updated 6 years ago
- Linux kernel modules developed by me for learning purposes☆19Jan 16, 2013Updated 13 years ago
- AxSuite is a toolset aimed to retrieve in-memory secrets saved by AxCrypt☆12Aug 13, 2020Updated 5 years ago
- A reverse-engineered lime gen3 scooter controller for an ESP8266.☆19Nov 18, 2022Updated 3 years ago
- EtherAnnotate IDA Pro Plugin - Parse EtherAnnotate trace files and markup IDA disassemblies with runtime values☆13May 4, 2010Updated 15 years ago
- Allows a user to grab documentation from online MSDN for a given function name in IDA, and import the documentation as a repeatable comme…☆15Jul 22, 2012Updated 13 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- ☆16Jan 14, 2016Updated 10 years ago
- Scanner de vulnerabilidades Web.☆15Sep 6, 2015Updated 10 years ago
- A little Keylogger for Windows developed in C++☆20Jan 24, 2016Updated 10 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13May 11, 2018Updated 7 years ago
- rename☆19Jul 19, 2017Updated 8 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 8 years ago
- Huawei login page extracted from real device and modified for #Evil-twin attack☆19May 8, 2022Updated 3 years ago
- Windows Remote Access Trojan (RAT)☆87Nov 12, 2015Updated 10 years ago
- simple rootkit for computer security class☆15Dec 18, 2012Updated 13 years ago
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago
- A pure Python library to parse ELF files.☆15Aug 7, 2013Updated 12 years ago
- Transform dumped executable memory back into an identical match from disk. Use network or local database to de-locate relocated binaries…☆12Jan 10, 2016Updated 10 years ago
- A Linux worm targeting vulnerable IoT devices with MMU. Reengineered from/inspired by Mirai botnet.☆18Nov 6, 2022Updated 3 years ago
- Exploits, Fuzzers, Scripts etc☆35Dec 30, 2025Updated 2 months ago
- Security tools to use on assessments.☆40May 9, 2016Updated 9 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Practice and learning in the world of C RE and exploit analysis☆33Feb 2, 2018Updated 8 years ago
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- s(4)u for Windows☆48Dec 8, 2020Updated 5 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Mar 20, 2015Updated 11 years ago
- Linux rootkit experimentations☆19May 19, 2015Updated 10 years ago
- This project uses the .NET framework to bypass Antivirus solutions.☆29Mar 24, 2013Updated 12 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- Automatically exported from code.google.com/p/fuzzdb☆14Jun 23, 2015Updated 10 years ago
- Greasemonky userscript to fix missing "Emails" search in Gmail☆12Nov 6, 2025Updated 4 months ago
- Tiny payload for transfer via LOKI - Provides high speed Virtual Channel two way file transfer capabilities☆27Feb 23, 2015Updated 11 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago