therealdreg / The-GTK-KeyloggerView external linksLinks
The GTK Keylogger
☆18Aug 11, 2023Updated 2 years ago
Alternatives and similar repositories for The-GTK-Keylogger
Users that are interested in The-GTK-Keylogger are comparing it to the libraries listed below
Sorting:
- Malware WinXPSP2.Cermalus Windows Kernel Virus☆16Aug 11, 2023Updated 2 years ago
- WinXPSP2.Cermalus on stereoids, supporting all 32 bits Windows version. Windows Kernel Virus stuff for noobs☆18Aug 11, 2023Updated 2 years ago
- Scapy tools and scripts☆20Jun 19, 2020Updated 5 years ago
- ☆19Dec 2, 2017Updated 8 years ago
- Download payload to disk and install it to startup then melt.☆35Apr 9, 2019Updated 6 years ago
- ☆35Sep 25, 2020Updated 5 years ago
- ☆10Aug 9, 2024Updated last year
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆16May 3, 2014Updated 11 years ago
- Remove the Telegram deleted account members from your destination group☆10Oct 14, 2025Updated 4 months ago
- This is the LaTeX source code a CC book called "Edible food". It contains fruits, vegetables, cereals, etc. with pictures and their names…☆12Feb 17, 2022Updated 4 years ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- Find your router's default password☆14Apr 7, 2015Updated 10 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- Hex encode & decode a string, right from your terminal.☆10Jan 5, 2023Updated 3 years ago
- FiSH/Mircryption clone for HexChat in 100% Python☆10Apr 9, 2018Updated 7 years ago
- A proof of concept for Joomla's CVE-2015-8562 vulnerability (Object Injection RCE)☆10May 3, 2024Updated last year
- malicious bash scripts☆10Apr 3, 2022Updated 3 years ago
- Generalized Cellular Automata generator: Easily explore, combine and refine many different types of algorithms☆21Aug 31, 2014Updated 11 years ago
- Detect the possible hash-types corresponding to a string, right from your terminal.☆11Jan 5, 2023Updated 3 years ago
- Credentials recovery project☆13Mar 25, 2022Updated 3 years ago
- A Python program that runs Spades (a 4-player card game) in a terminal☆11Oct 11, 2021Updated 4 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- build system to cross-compile cydia packages for cydia.radare.org☆10Aug 23, 2019Updated 6 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆13Dec 13, 2021Updated 4 years ago
- Chocolatey 'docker' package☆12Jan 21, 2019Updated 7 years ago
- ☆14Sep 25, 2020Updated 5 years ago
- Normalizer for honeypot data.☆11Dec 6, 2023Updated 2 years ago
- A CAPTCHA recognition demo in tensorflow.☆11Jun 13, 2017Updated 8 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- Popping boxes with Nmap☆18Apr 16, 2012Updated 13 years ago
- A sample Server/Client game writen with C#. This application uses a custom message protocol on TCPClient & TCPListener with asynchronous☆11May 17, 2019Updated 6 years ago
- bmod parses binaries for modification/patching and disassembles machine code sections.☆12Apr 19, 2018Updated 7 years ago
- vncsnapshot☆14Mar 23, 2012Updated 13 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- ☆13Sep 14, 2022Updated 3 years ago
- Running TaintDroid from the command line and analyze output☆17Mar 28, 2012Updated 13 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- MS17-010☆12Oct 25, 2017Updated 8 years ago
- Lightweight and fast UI for nodejs-pool based project, designed for c3pool.com☆10Mar 7, 2021Updated 4 years ago