sighook / wxp78keyLinks
Tiny keylogger for Win XP/Vista/7/8 with ftp upload.
☆15Updated 3 years ago
Alternatives and similar repositories for wxp78key
Users that are interested in wxp78key are comparing it to the libraries listed below
Sorting:
- Finder Predator The Thief botnet panel☆7Updated 5 years ago
- KeplerPulse is a tool that generates a Powershell command that once executed on a Machine, Downloads and executes your desired Executable…☆10Updated 3 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆13Updated 8 years ago
- Undetectable Windows Payload Generation☆10Updated 7 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Abuses Powershell Profiles☆13Updated 9 years ago
- Spider or repeater to find all links.☆13Updated 4 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- A SMTP Checker / SMTP Cracker with SOCKS support and e-mail delivery test (inbox check) for mailpass combolists.☆14Updated 3 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- pen testing scripts☆11Updated 4 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- SkyRAT - Powershell Remote Administration Tool☆32Updated 7 years ago
- Collection of cracked malware☆14Updated 6 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Updated 6 years ago
- Ubuntu stealer, steal ubuntu information in local pc☆21Updated 5 years ago
- Various Crypter Project☆9Updated 11 years ago
- Stealer of sessions of the Telegram Desktop application on windows 7, 8 and 10 🔑☆9Updated 4 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- A tool for recover router password☆30Updated 6 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆29Updated 6 years ago
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network☆9Updated 2 years ago
- Python implementation of the SlowLoris DoS attack.☆24Updated 8 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Updated 5 years ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.☆6Updated 12 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Updated last year
- Python RAT with reverse connection and asymmetric encrypted communications☆16Updated 4 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- Malware USB Spread | POC | Example☆8Updated 6 years ago