sighook / wxp78keyLinks
Tiny keylogger for Win XP/Vista/7/8 with ftp upload.
☆15Updated 3 years ago
Alternatives and similar repositories for wxp78key
Users that are interested in wxp78key are comparing it to the libraries listed below
Sorting:
- Various Crypter Project☆9Updated 11 years ago
- Spider or repeater to find all links.☆13Updated 4 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆13Updated 8 years ago
- A SMTP Checker / SMTP Cracker with SOCKS support and e-mail delivery test (inbox check) for mailpass combolists.☆14Updated 3 years ago
- BruteForce SSH Login Credentials much Faster...!...Bring the Thunder of Asgard to SSH☆14Updated last year
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network☆8Updated 2 years ago
- Finder Predator The Thief botnet panel☆7Updated 5 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Updated 4 years ago
- KeplerPulse is a tool that generates a Powershell command that once executed on a Machine, Downloads and executes your desired Executable…☆10Updated 3 years ago
- This is the list of all rootkits found so far on github and othersites.☆29Updated 4 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆30Updated 6 years ago
- Abuses Powershell Profiles☆13Updated 9 years ago
- Repository of tools used in my blog☆51Updated last year
- PHP tool to grab urls of a specific site.☆9Updated 6 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Commands to perform various activities related to penetration testing and red teaming☆19Updated 5 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 3 years ago
- Inject Metasploit Shell Code in Legitimate Process☆11Updated 4 years ago
- Subdomain crawler with wordlist using python☆12Updated 5 years ago
- Malware USB Spread | POC | Example☆8Updated 6 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 5 years ago
- This Shell script can create a chrooted environment along with a SSH Jail for the same. This can be used either for a single user jail or…☆18Updated 8 years ago
- Multiple Password Generator - Unique Characters, Unique Sequences, Numbers, Uppercase, Lowercase, Symbols, Multiple Generator☆13Updated 7 years ago
- Wordlists generated over the years of penetration testing☆12Updated 3 months ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- HEVD exploits☆9Updated 6 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆24Updated 5 years ago
- 🔅 Reverse shell written on python3☆15Updated 4 years ago
- Password list character frequency analyzer that can output hashcat masks☆17Updated 6 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Updated 2 years ago