sighook / wxp78keyLinks
Tiny keylogger for Win XP/Vista/7/8 with ftp upload.
☆15Updated 3 years ago
Alternatives and similar repositories for wxp78key
Users that are interested in wxp78key are comparing it to the libraries listed below
Sorting:
- Finder Predator The Thief botnet panel☆7Updated 5 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆13Updated 8 years ago
- BruteForce SSH Login Credentials much Faster...!...Bring the Thunder of Asgard to SSH☆13Updated last year
- KeplerPulse is a tool that generates a Powershell command that once executed on a Machine, Downloads and executes your desired Executable…☆10Updated 3 years ago
- Spider or repeater to find all links.☆13Updated 4 years ago
- A simple AES malware crypter☆16Updated 7 years ago
- Various Crypter Project☆9Updated 11 years ago
- Abuses Powershell Profiles☆13Updated 9 years ago
- Python implementation of the SlowLoris DoS attack.☆24Updated 8 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 3 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆24Updated 5 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Updated 4 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Updated 2 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆12Updated 2 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Inject Metasploit Shell Code in Legitimate Process☆11Updated 4 years ago
- Light C++ Logger Library☆18Updated 7 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- Commands to perform various activities related to penetration testing and red teaming☆19Updated 5 years ago
- bash script to prepare Debian machines for OSINT use☆11Updated 5 years ago
- Malware USB Spread | POC | Example☆8Updated 6 years ago
- Subdomain crawler with wordlist using python☆12Updated 5 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 3 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- HEVD exploits☆9Updated 6 years ago
- first commit☆10Updated 8 years ago