therealdreg / okhiLinks
Open Keylogger Hardware Implant - USB & PS2 Keyboards
☆82Updated 3 weeks ago
Alternatives and similar repositories for okhi
Users that are interested in okhi are comparing it to the libraries listed below
Sorting:
- FTDI bricker just for fun - malware POC+hardware hacking CTF☆21Updated last year
- ☆21Updated 6 months ago
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- A custom SentinelOne USB scanner.☆18Updated 3 years ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆66Updated last year
- Stealthy x64 thread manipulation library for calling functions inside target processes without creating remote threads or installing hook…☆55Updated 3 weeks ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆86Updated last year
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆114Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated 2 years ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 5 years ago
- ☆69Updated 7 months ago
- ☆59Updated 5 months ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆86Updated 2 months ago
- Bitpixie exploitation PoC☆58Updated 2 months ago
- A few STUXNET samples and live traffic captures from July 2010 while many stuxnet implants were still operational.☆26Updated last year
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- AES-256 Microsoft Cryptography API Example Use.☆31Updated last year
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆35Updated this week
- A collection of PoCs for different injection techniques on Windows!☆46Updated 2 years ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆98Updated 3 months ago
- EvtPsst☆55Updated last year
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆27Updated 5 months ago
- ☆33Updated 2 years ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆146Updated last year
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆57Updated last year
- Reports on Driver, LSASS and other security services mitigations☆30Updated last month
- ☆108Updated 10 months ago
- ☆31Updated 9 months ago
- Purpose-built Red Team network hardware implant made from common components.☆23Updated 2 years ago