wchill / WiFiKeyloggerLinks
Hardware keylogger dongle with built-in Wi-Fi for live keystroke capture/injection and other fun stuff
☆21Updated 9 years ago
Alternatives and similar repositories for WiFiKeylogger
Users that are interested in WiFiKeylogger are comparing it to the libraries listed below
Sorting:
- Wi-Fi Backdoors☆39Updated 9 years ago
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆27Updated 9 years ago
- All tools you needed during penetration testing.☆18Updated 8 years ago
- Automated Cyber Offense☆91Updated 6 years ago
- Pentest tools for Windows hacking processes☆13Updated 8 years ago
- Scripts and tools for ISM hacking☆15Updated 7 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Updated 9 years ago
- library and intepreter for penetration testing tools☆30Updated 9 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- A proof-of-concept for ransomware encryption☆18Updated 9 years ago
- Graphical user interface for the windows version of THC Hydra☆53Updated 7 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 8 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Updated 9 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 9 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆47Updated 8 years ago
- a javascript keylogger included in a gif file☆38Updated 12 years ago
- A backdoor socket that takes commands from a client and executes them in the server machine☆9Updated 8 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android) Remote Administration Tool with an embedded Python interpreter.☆15Updated 9 years ago
- Worlds first Google Android kernel rootkit as featured at DEF CON 18☆1Updated 10 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 8 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆28Updated 4 years ago
- Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638)☆42Updated 3 years ago
- A python script for obfuscating wireless networks☆78Updated 8 years ago
- Experimental examples of Ransomware in different languages☆37Updated 7 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆40Updated 9 years ago
- FUD Metasploit Android Payload☆11Updated 9 years ago
- Unix remote-shell backdoor develop with Bash, Netcat, OpenSSL (data encryption with AES-128bit)☆25Updated 7 years ago
- Samsung TV Denial of Service (DoS) Attack☆37Updated 8 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Updated 7 years ago