pr0xy-8L4d3 / keylogiqView external linksLinks
persistent windows 10 and 11 keylogger
☆22Mar 16, 2023Updated 2 years ago
Alternatives and similar repositories for keylogiq
Users that are interested in keylogiq are comparing it to the libraries listed below
Sorting:
- This is a small framework for generate and listen to Keylogger malwares... And also the most effective and most useful feature about this…☆19Apr 15, 2020Updated 5 years ago
- Create Evil Twin network that deauthernticates victims to force them to connect to your evil AP.☆27May 21, 2021Updated 4 years ago
- HadoopLink是基于Hadoop及BaseMR进一步封装而来的工作链框架。该框架省去了您生成Job,JobControl,ContrlledJob的繁杂重复代码。同时您可以非常便捷的通过注释设置MapReduce任务之间的依赖关系。HadoopLink支持多个任务链并…☆11Sep 2, 2019Updated 6 years ago
- Make your ATmega32U4 controller into PS3/PC compatible gamepad☆11Mar 3, 2023Updated 2 years ago
- AES Ransomware in batch☆11Jun 25, 2024Updated last year
- UniFi 5 Controller for Raspberry Pi☆13Jan 31, 2018Updated 8 years ago
- ☆11Feb 6, 2019Updated 7 years ago
- Open Source Intelligence - Buscando informações sobre infraestruturas☆10Feb 13, 2019Updated 7 years ago
- A simple low-interaction port monitoring honeypot.☆19Jun 14, 2020Updated 5 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- This is a stealthier version of Keylogger-lkm, it introduces hiding techniques and also a command entering option.☆13Jan 27, 2023Updated 3 years ago
- Automatic cloud backup of Kali Linux data☆12Feb 27, 2020Updated 5 years ago
- A digispark supported keylogger.Only worked on W10.☆12Jul 11, 2022Updated 3 years ago
- Get latest Exploit Databases notification on your Desktop☆16Jan 29, 2020Updated 6 years ago
- My LUFA fork with USB Mass Storage Bootloader for Pro Micro (see promicro branch)☆12Jul 2, 2019Updated 6 years ago
- It's only hitting vulnerable path in termdd.sys!!! NOT DOS☆12May 19, 2019Updated 6 years ago
- Teensy code to brute force a keylogger's unlock code☆15Sep 5, 2016Updated 9 years ago
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆12Apr 8, 2024Updated last year
- This project uses an ESP32-Cam connected to a motion sensor. When the motion sensor is activated, a photo will be submitted to the desire…☆11Sep 4, 2021Updated 4 years ago
- Let Unifi Guests check voucher data bundle left☆10Nov 13, 2017Updated 8 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- sudoroom irc bot☆10Jul 19, 2022Updated 3 years ago
- This tool captures all keyboard actions, public and private IP adresses of user, which folder user works on, what user does and saves dat…☆11Jul 30, 2020Updated 5 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆11Dec 28, 2016Updated 9 years ago
- A simple reverse shell in Nim langauge. It should bypass AV-s (don't submit binaries)☆16Oct 10, 2019Updated 6 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆15Jan 14, 2019Updated 7 years ago
- Honeypot FTP server written in .NET Core (C#) for both Linux and Windows.☆14Dec 8, 2022Updated 3 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆11May 25, 2019Updated 6 years ago
- Adafruit MatrixPortal S3 CircuitPython Powered Internet Display PCB☆13Oct 1, 2025Updated 4 months ago
- Pentesting-related Bash Scripts☆12Jan 4, 2020Updated 6 years ago
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- System wide keylogger for Mac and Windows #openFrameworks☆13Sep 5, 2011Updated 14 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Sep 22, 2021Updated 4 years ago
- Advanced Keylogger written in C++11 for Windows OS☆11Mar 27, 2017Updated 8 years ago
- ☆15Feb 19, 2023Updated 2 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆13Sep 23, 2019Updated 6 years ago
- eZpublish vulnerability scanner☆10Feb 20, 2020Updated 5 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Dec 11, 2025Updated 2 months ago
- Application features: Sets visibility of its own executeable file to hidden --> Adds itself to the registry of run-on-startup application…☆11Jan 30, 2019Updated 7 years ago