therealdreg / okhiLinks
Open Keylogger Hardware Implant - USB & PS2 Keyboards
☆75Updated this week
Alternatives and similar repositories for okhi
Users that are interested in okhi are comparing it to the libraries listed below
Sorting:
- FTDI bricker just for fun - malware POC+hardware hacking CTF☆20Updated 8 months ago
- ☆20Updated 2 months ago
- Explore and filter your GitHub starred repositories☆27Updated last year
- Vibe Malware Triage - MCP server for static PE analysis.☆53Updated 2 weeks ago
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆56Updated last month
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated 10 months ago
- ☆55Updated last month
- Situational Awareness script to identify how and where to run implants☆50Updated 6 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 2 months ago
- ☆30Updated 6 months ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆98Updated last year
- ☆68Updated 4 months ago
- ☆107Updated 7 months ago
- A more reliable way of resolving syscall numbers in Windows☆49Updated last year
- An In-memory Embedding of CPython☆28Updated 4 years ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆74Updated 5 months ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated last year
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆39Updated 7 months ago
- ☆42Updated 2 years ago
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆109Updated 8 months ago
- Splitting and executing shellcode across multiple pages☆103Updated last year
- Work, timer, and wait callback example using solely Native Windows APIs.☆89Updated last year
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆48Updated last year
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆41Updated last year
- Nim process hollowing loader☆56Updated 10 months ago
- Red Team Operation's Defense Evasion Technique.☆52Updated last year
- ☆18Updated 2 weeks ago
- EvtPsst☆53Updated last year
- Win32 keylogger that supports all (non-ime using) languages correctly☆50Updated last year
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 5 years ago