z00z / ZLoggerLinks
Userspace remote keylogger for Linux, works with X, logs key stikes to a file and sends report by email.
☆146Updated last year
Alternatives and similar repositories for ZLogger
Users that are interested in ZLogger are comparing it to the libraries listed below
Sorting:
- Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Scrip…☆164Updated last year
- PowerFull Administration Tool For Linux☆191Updated 8 years ago
- Community-built scenarios for Wifiphisher☆375Updated 4 years ago
- Hacking systems with the automation of PasteJacking attacks.☆398Updated last year
- ☆88Updated last year
- Adds ability to successfully login into websites that have a delay after login and adds directory of chromedriver, this fork was used in …☆157Updated 3 years ago
- A framework for pentesters that facilitates evil twin attacks as well as exploiting other wifi vulnerabilities☆331Updated last year
- A simple script to generate a hidden url for social engineering.☆122Updated 5 years ago
- Simple DNS Spoofing tool made in Python 3 with Scapy☆79Updated 6 years ago
- Multiplatform payload dropper☆280Updated 4 years ago
- A simple wordlists generator and mangler written in Python 3.10.1.☆123Updated 2 years ago
- This is Jester ransomware like, in Mr Robot movie (coded by Darlene S1E2,3), Please beware warning, after start you can't recover the fil…☆401Updated 5 years ago
- Python Remote Access Trojan☆143Updated 5 years ago
- A Phishing Dropper designed to Pentest.☆276Updated 8 years ago
- Sinister is Windows/Linux Keylogger Generator which sends key-logs via email with other juicy target info☆461Updated last year
- Quasar : An Information Gathering Framework For Lazy Penetration Testers☆162Updated 4 years ago
- Chrome Keylogger Extension | Post Exploitation Tool☆433Updated 3 years ago
- WinSpy a Windows reverse shell Backdoor creator with an Automatic IP Poisener☆209Updated 7 years ago
- Automatically hacking usb stick (gets passwords + keylogger)☆242Updated 6 years ago
- Network Attack wifi attack vlan attack arp attack Mac Attack Attack revealed etc../☆141Updated 5 years ago
- Big-Papa is a remote cookie stealer which can then be used for session hijacking and Bypassing 2 Factor Authentication☆105Updated 3 years ago
- Create awesome wordlist with python, demo: https://asciinema.org/a/101677☆125Updated 6 years ago
- ☆35Updated 6 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆767Updated 5 years ago
- Python tool for phishing☆250Updated last year
- The `anonymous` script from ParrotSec OS and BackBox Linux, perfected to run on Kali Linux Rolling. Run the script with `sudo sh script.…☆133Updated 5 years ago
- Undetectable helps you to generate fully undetectable payload of metasploit which can bypass android antivirus.☆110Updated 2 years ago
- A python keylogger that does more than any other keylogger - Key logger, Clicks logger and Screenshots☆485Updated last year
- Using Social Engineering To Obtain WiFi Passwords☆102Updated 8 years ago
- PhishX - The Complete Spear Phishing Tool☆110Updated 7 years ago