wopot / jsgifkeyloggerLinks
a javascript keylogger included in a gif file
☆39Updated 3 months ago
Alternatives and similar repositories for jsgifkeylogger
Users that are interested in jsgifkeylogger are comparing it to the libraries listed below
Sorting:
- Some exploits for ZeroNights 0x03☆36Updated 10 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- pwning & info gathering via user browser☆39Updated 10 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆50Updated 8 years ago
- A python script for obfuscating wireless networks☆79Updated 9 years ago
- Advanced Netstat Using Python For Windows☆46Updated 8 years ago
- ~ BannerGrab☆25Updated 9 years ago
- Some NSE scripts to search information from routers☆35Updated 9 years ago
- Some of my Nmap scripts☆22Updated 8 years ago
- ☆91Updated 8 years ago
- ☆78Updated 6 years ago
- This version touches disk for registry persistence.☆26Updated 10 years ago
- A modular distributed penetration testing tool.☆41Updated 8 years ago
- ssh public host key scanner using shodan☆118Updated 6 years ago
- 0x88 exploit pack Decoded☆27Updated 11 years ago
- Terminal Ip Lookup Tool☆56Updated 11 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Updated 8 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Exploits and research stuffs☆55Updated last month
- simple reverse tcp backdoor hack☆63Updated 5 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- ☆27Updated 8 years ago
- NMAP NSE scripts - (not all)) my contributions before merging to nmap svn☆36Updated 10 years ago
- Try various exploits to get root☆19Updated 12 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 8 years ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Updated 12 years ago
- XSS Weaponization☆34Updated 12 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆62Updated 10 years ago
- Inject beef hooks into HTTP traffic and track hooked systems from cmdline☆124Updated 10 years ago
- [Python] Google Scraper & Mass Exploiter☆29Updated 4 years ago