z00z / ZLoggerLinks
Userspace remote keylogger for Linux, works with X, logs key stikes to a file and sends report by email.
☆145Updated last year
Alternatives and similar repositories for ZLogger
Users that are interested in ZLogger are comparing it to the libraries listed below
Sorting:
- Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Scrip…☆161Updated last year
- PowerFull Administration Tool For Linux☆187Updated 8 years ago
- Community-built scenarios for Wifiphisher☆369Updated 4 years ago
- Quasar : An Information Gathering Framework For Lazy Penetration Testers☆160Updated 4 years ago
- ☆88Updated last year
- Multiplatform payload dropper☆276Updated 4 years ago
- A framework for pentesters that facilitates evil twin attacks as well as exploiting other wifi vulnerabilities☆321Updated last year
- A simple script to generate a hidden url for social engineering.☆121Updated 5 years ago
- Python Remote Access Trojan☆142Updated 5 years ago
- Hacking systems with the automation of PasteJacking attacks.☆401Updated last year
- PhishX - The Complete Spear Phishing Tool☆108Updated 7 years ago
- 🛅 Passwords using personal information☆83Updated 5 years ago
- This is Jester ransomware like, in Mr Robot movie (coded by Darlene S1E2,3), Please beware warning, after start you can't recover the fil…☆390Updated 5 years ago
- Adds ability to successfully login into websites that have a delay after login and adds directory of chromedriver, this fork was used in …☆155Updated 3 years ago
- Big-Papa is a remote cookie stealer which can then be used for session hijacking and Bypassing 2 Factor Authentication☆105Updated 3 years ago
- WinSpy a Windows reverse shell Backdoor creator with an Automatic IP Poisener☆208Updated 6 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆755Updated 5 years ago
- ☆35Updated 6 years ago
- Chrome Keylogger Extension | Post Exploitation Tool☆430Updated 3 years ago
- A Phishing Dropper designed to Pentest.☆274Updated 8 years ago
- A simple wordlists generator and mangler written in Python 3.10.1.☆124Updated last year
- Simple DNS Spoofing tool made in Python 3 with Scapy☆78Updated 6 years ago
- Using Social Engineering To Obtain WiFi Passwords☆102Updated 7 years ago
- Sinister is Windows/Linux Keylogger Generator which sends key-logs via email with other juicy target info☆459Updated last year
- Samples Phishing tools made for Linux it contains 30 different type of Phishing Pages made with flask☆107Updated 3 years ago
- NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive K…☆122Updated last year
- Control remote computers using discord bot and python 3.☆182Updated 3 years ago
- Detect evil urls that uses IDN Homograph Attack.☆204Updated 7 years ago
- Undetectable helps you to generate fully undetectable payload of metasploit which can bypass android antivirus.☆110Updated 2 years ago
- A tool that finds and scan sites for sql injection vulnerability☆161Updated 5 years ago