therealdreg / The-GTK-KeyloggerLinks
The GTK Keylogger
☆19Updated 2 years ago
Alternatives and similar repositories for The-GTK-Keylogger
Users that are interested in The-GTK-Keylogger are comparing it to the libraries listed below
Sorting:
- Power Loader botnet☆41Updated 10 years ago
- ☆39Updated 8 years ago
- Archive of ransomware decryptors☆33Updated 7 years ago
- Various Crypter Project☆52Updated 11 years ago
- Process Hollowing techniques as used in many file Crypters (C/C++)☆84Updated 4 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆59Updated 8 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆45Updated 7 years ago
- Hidden kernel mode code execution for bypassing modern anti-rootkits.☆85Updated 14 years ago
- ☆42Updated 8 years ago
- Project aimed at creating a malware able to evolve and adapt to the various host machines through metamorphic modifications, spontaneous …☆44Updated 7 years ago
- Simple C++ ransomware, prove the concept.☆26Updated 8 years ago
- Public open-source code of malware Shamoon (aka Disttrack).☆38Updated 10 years ago
- Penetration Testing Tool for Windows 7 => 10☆15Updated 7 years ago
- The Grum Spam Bot☆20Updated 10 years ago
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting,Fuzzing,Privilege-Escalation,browser-security,Spyware,Malwres evade…☆35Updated 6 years ago
- Alina Spark - Point of Sales Trojan☆48Updated 10 years ago
- A simple AES malware crypter☆16Updated 7 years ago
- Educational repository for learning about rootkits and Windows Kernel Hooks.☆49Updated 10 years ago
- Example Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic leve…☆71Updated 6 years ago
- A simple polymorphic engine☆42Updated 6 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆179Updated last year
- Fileless persistence, attacks and anti-forensic capabilties.☆94Updated 6 years ago
- Passive UAC elevation using dll infection☆75Updated 10 years ago
- Carberp Banking Trojan☆123Updated 10 years ago
- Inject code into a legitimate process☆145Updated 10 years ago
- ☆23Updated 9 years ago
- Hive solves a critical problem for the malware operators at the CIA.☆68Updated 7 years ago
- My collection of unpackers for malware packers/crypters☆28Updated 8 years ago
- Malware WinXPSP2.Cermalus Windows Kernel Virus☆16Updated 2 years ago
- DLL Injection Library & Tools☆73Updated 9 years ago