theriley106 / mitm-keylogger
Using a MITM proxy to add a browser-based keylogger to devices on your local network
☆11Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for mitm-keylogger
- Solving (Audio-Based) Amazon Checkout Captchas Using the AWS Medical Transcription Service 😂 😂 😂☆11Updated 4 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- Network worms capable of stealing files from and deleting sensitive information from remote system.☆13Updated 8 years ago
- ☆14Updated 7 years ago
- A simple as possible man in the middle written in python using scapy☆9Updated 5 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆25Updated 7 years ago
- Random scripts I write to automate non-hacking stuff☆21Updated 5 years ago
- Python RAT with reverse connection and asymmetric encrypted communications☆14Updated 4 years ago
- bluesnarfing proof-of-concept tool.☆44Updated 8 years ago
- A Simple C&C Server Written In Python☆34Updated 6 years ago
- PHP Application To Spoof And Send E-mail.☆12Updated 8 years ago
- Apple BLE research☆28Updated 4 years ago
- A honeypot that can be used to observe traffic directed at home routers.☆18Updated 6 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆23Updated 5 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆13Updated 8 years ago
- Metasploit/MSFVenom Payload Generator Stand Alone☆29Updated 7 years ago
- Undetectable Windows Payload Generation☆10Updated 6 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆13Updated 6 years ago
- Small social engineering tool written in python2☆18Updated 2 weeks ago
- This is the list of all rootkits found so far on github and othersites.☆29Updated 3 years ago
- PHP Script intdended to be used during Phishing campaigns as a credentials collector linked to backdoored HTML <form> action parameter☆57Updated 3 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆19Updated 10 years ago
- This tool audits a website before hand and can exploit vulnerabilities if the website scanned has any.☆13Updated 11 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆17Updated 8 years ago
- Scan the entire internet for SSH and Telnet services. Then hack them.☆78Updated 2 years ago