sweetsoftware / FTPKeyLoggerLinks
Simple keylogger for Windows with HTML output and FTP upload.
☆33Updated 10 years ago
Alternatives and similar repositories for FTPKeyLogger
Users that are interested in FTPKeyLogger are comparing it to the libraries listed below
Sorting:
- Remote Windows shell☆32Updated 10 years ago
- Better Remote Access Trojan☆49Updated 8 years ago
- Alina Spark - Point of Sales Trojan☆48Updated 10 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- POC of code that downloads and executes shellcode in memory.☆80Updated 11 years ago
- A python based https remote access trojan for penetration testing☆84Updated 9 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 9 years ago
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆79Updated 7 years ago
- Dexter v2 - Point of Sales Trojan☆26Updated 10 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆28Updated 4 years ago
- Tinba Banking Trojan☆85Updated 10 years ago
- A python based dropper, that uses steganography and an image over http to transfer a file☆58Updated 9 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆59Updated 9 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- Automatic backdooring apk with meterpreter (PoC)☆51Updated 8 years ago
- SideEffect Keylogger☆13Updated 8 years ago
- Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but e…☆41Updated 3 years ago
- A reverse ssh shell written in python, intended for penetration testers to use as a covert channel on windows☆87Updated 9 years ago
- Windows Remote Access Trojan (RAT)☆80Updated 9 years ago
- Passive UAC elevation using dll infection☆74Updated 10 years ago
- A project to learn about malware and c++ coding☆22Updated 9 years ago
- Advanced Controller/Server/Client Reverse Shell/Bot – Windows/Linux – Python☆68Updated 9 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- pwning & info gathering via user browser☆39Updated 10 years ago
- ☆26Updated 8 years ago
- Some are on exploit-db, some aren't. Mostly useless.☆12Updated 7 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆59Updated 10 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 8 years ago
- Seeing how easy it is to create ransomware.☆46Updated 2 years ago
- SQL injection in Neutrino panel☆8Updated 9 years ago