sinfocol / KeePassLogger
KeePass Two-Channel Auto-Type Obfuscation Keylogger
☆11Updated 9 years ago
Alternatives and similar repositories for KeePassLogger:
Users that are interested in KeePassLogger are comparing it to the libraries listed below
- ☆24Updated 9 years ago
- Extract unencrypted SSH keys from pageant memory dump☆15Updated 9 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- Anti-AV compilation☆42Updated 11 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- j0llydmper is a windows service that allows you to dump furtively and automaticaly some contents of USB disks just plugged in your comput…☆40Updated 13 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Updated 10 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆11Updated 10 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- Application Security library☆11Updated 12 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- Print the strings of encoded printable characters in files☆12Updated 9 years ago
- A simple exploitable ActiveX control for RE/VR☆19Updated 10 years ago
- Windows hard shutdown shellcode. Don't need administrator rights.☆12Updated 9 years ago
- Exploit kit analyzer☆21Updated 10 years ago
- Educational Python penetration testing framework☆10Updated 7 years ago
- The Horrific Omnipotent Rootkit☆22Updated 8 years ago
- Ayaabu is a funny trick that fake the installation of many Antivirus☆12Updated 8 years ago
- Malpimp is an advanced API tracing tool and designed to automate the reverse engineering process. In the backend it uses pydbg to hook t…☆8Updated 8 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- Sample libraries to be used with IAT Patcher☆33Updated 2 years ago
- Game Hacking Adventures Scripts & Tools☆20Updated 12 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆49Updated 5 months ago
- UAC Copy Tool☆9Updated 9 years ago
- ☆10Updated 3 months ago
- Dexter v2 - Point of Sales Trojan☆26Updated 10 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Updated 9 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Updated 9 years ago
- My presentations from different conferences☆15Updated 6 years ago
- Scanner for Regin Virtual Filesystems☆26Updated 10 years ago