theriley106 / mitm-keyloggerLinks
Using a MITM proxy to add a browser-based keylogger to devices on your local network
☆13Updated 5 years ago
Alternatives and similar repositories for mitm-keylogger
Users that are interested in mitm-keylogger are comparing it to the libraries listed below
Sorting:
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆40Updated 9 years ago
- Python implementation of the SlowLoris DoS attack.☆24Updated 8 years ago
- Solving (Audio-Based) Amazon Checkout Captchas Using the AWS Medical Transcription Service 😂 😂 😂☆12Updated 4 years ago
- Agent Tesla Spyware C2 Exploit [PATCHED]☆31Updated 6 years ago
- Recursive Credit Card Searcher For Windows C++ and Linux☆13Updated 3 years ago
- A python3 script that uses cl1p website to send and receive secret messages☆29Updated 4 years ago
- A standalone addon for GnuPG☆18Updated 6 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆21Updated 11 years ago
- SubZone - Subdomains, Dns records, & more! || Python tutorial || Certificate authority abuse || Adavnced || Hacking/Info-Sec ||☆43Updated 3 months ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Updated 6 years ago
- A simple SMTP Mass mailer program utilising open relays.☆10Updated 8 years ago
- This is the list of all rootkits found so far on github and othersites.☆29Updated 4 years ago
- Kill Any Antivirus Using Python For Windows Users .☆44Updated 8 years ago
- Port scanning and domain utility.☆30Updated 7 years ago
- A fully featured backdoor that uses Gmail as a C&C server☆19Updated 9 years ago
- Captive Portal Evasion Tool☆14Updated 8 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆12Updated 4 years ago
- ARP spoof then session jack within your browser☆28Updated 11 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 7 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆17Updated 4 years ago
- Get clients and access points.☆49Updated 5 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆19Updated 8 years ago
- Wardriving ekoparty☆15Updated 7 years ago
- AES encrypted python backdoor that communicates AES encrypted data☆9Updated 10 years ago
- pentest toolbox☆28Updated 2 years ago
- SkyRAT - Powershell Remote Administration Tool☆33Updated 7 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- PHP Script intdended to be used during Phishing campaigns as a credentials collector linked to backdoored HTML <form> action parameter☆60Updated 3 years ago
- Fake AccessPoint Attack☆30Updated 6 years ago