yorgosk / Keylogger
A keylogger for Windows, developed as part of the "Build an Advanced Keylogger using C++ for Ethical Hacking!" course on Udemy
☆17Updated 6 years ago
Related projects: ⓘ
- Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit f…☆28Updated 5 years ago
- Experimental examples of Ransomware in different languages☆37Updated 6 years ago
- ☆38Updated 7 years ago
- SpooKey is a keylogger written in C++ that uses kernel-level APIs to capture keystrokes (Linux only. Windows is a work in progress)☆31Updated 4 years ago
- Various Crypter Project☆50Updated 10 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆26Updated 7 years ago
- Simple Remote Access Trojan☆20Updated 7 years ago
- Virus RAT v8.0 Beta☆21Updated 7 years ago
- ☆26Updated 7 years ago
- ZeroRemote Trojan SRC Extract☆19Updated 7 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆41Updated 6 years ago
- Citadel 1.3.5.1☆27Updated 11 years ago
- BlackWorm SRC Extract☆16Updated 7 years ago
- Penetration Testing Tool for Windows 7 => 10☆15Updated 6 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆47Updated 5 years ago
- Power Loader botnet☆38Updated 9 years ago
- Malicious Software SRC Extract☆70Updated 7 years ago
- ☆19Updated 7 years ago
- Alina Spark - Point of Sales Trojan☆46Updated 9 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 7 years ago
- Random stuff☆16Updated 6 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆58Updated 6 years ago
- ☆17Updated this week
- Malware Dump☆19Updated 7 years ago
- ☆11Updated this week
- ☆12Updated 7 years ago
- Minimal keylogger written in C, remote upload of keystrokes and screen snapshots!☆28Updated 6 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆54Updated 7 years ago
- Access windows machine remotely on HTTP☆12Updated 3 years ago
- Web Based Crypter☆7Updated 10 years ago