Simple keylogger for Windows with HTML output and FTP upload.
☆33Dec 25, 2014Updated 11 years ago
Alternatives and similar repositories for FTPKeyLogger
Users that are interested in FTPKeyLogger are comparing it to the libraries listed below
Sorting:
- Remote Windows shell☆31Jun 22, 2014Updated 11 years ago
- python client/server keystroke logger☆23Oct 7, 2012Updated 13 years ago
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Feb 1, 2026Updated last month
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Feb 9, 2016Updated 10 years ago
- Keylogger Code In C++ Will Work On Window 7, 8, 8.1, And 10☆81Jul 12, 2018Updated 7 years ago
- ☆10May 6, 2017Updated 8 years ago
- C++ Keylogger for windows 7. Works with DLL injection on explorer.exe☆26Nov 12, 2014Updated 11 years ago
- A little Keylogger for Windows developed in C++☆20Jan 24, 2016Updated 10 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Apr 29, 2017Updated 8 years ago
- Phishing webapp generator☆42Aug 17, 2018Updated 7 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆12Oct 10, 2015Updated 10 years ago
- A ptrace based sandbox. (PoC)☆14Jun 3, 2018Updated 7 years ago
- Tool to analyze iOS crash reports☆29Jan 12, 2014Updated 12 years ago
- lz77win sources!lz77 is the compression software for the windows platform.☆24Apr 16, 2019Updated 6 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Jun 18, 2018Updated 7 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 12 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- Automated install process for Phishing Frenzy☆24Dec 1, 2014Updated 11 years ago
- Multithreaded DNS recursive host brute-force tool☆13May 11, 2015Updated 10 years ago
- A tool to generate graph and other output from NMAP XML files☆116Mar 9, 2019Updated 7 years ago
- Shellcode Of Death☆43Aug 31, 2013Updated 12 years ago
- ☆24Jul 24, 2020Updated 5 years ago
- Educational repository for learning about rootkits and Windows Kernel Hooks.☆48Mar 21, 2015Updated 10 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆44Sep 26, 2016Updated 9 years ago
- Automated Password Dumper for Web Browsers☆16Mar 23, 2014Updated 11 years ago
- Python botnet and backdoor☆1,613Mar 2, 2023Updated 3 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- Basic file metadata gathering script☆21Apr 16, 2025Updated 11 months ago
- linux lcx☆11Jul 18, 2016Updated 9 years ago
- Prometheus Service Discovery for Tailscale (Python Edition)☆26Apr 3, 2022Updated 3 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆10Jun 18, 2020Updated 5 years ago
- Learning PySpark video series☆11Mar 5, 2018Updated 8 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 11 years ago
- fanotify cron system☆21Sep 15, 2015Updated 10 years ago