z00z / ZLoggerLinks
Userspace remote keylogger for Linux, works with X, logs key stikes to a file and sends report by email.
☆139Updated last year
Alternatives and similar repositories for ZLogger
Users that are interested in ZLogger are comparing it to the libraries listed below
Sorting:
- Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Scrip…☆159Updated last year
- PowerFull Administration Tool For Linux☆160Updated 7 years ago
- A simple script to generate a hidden url for social engineering.☆123Updated 4 years ago
- Python Remote Access Trojan☆139Updated 4 years ago
- 🛅 Passwords using personal information☆84Updated 4 years ago
- ☆86Updated last year
- A tool that finds and scan sites for sql injection vulnerability☆156Updated 5 years ago
- This is Jester ransomware like, in Mr Robot movie (coded by Darlene S1E2,3), Please beware warning, after start you can't recover the fil…☆370Updated 5 years ago
- Multiplatform payload dropper☆274Updated 3 years ago
- Hacking systems with the automation of PasteJacking attacks.☆396Updated 7 months ago
- "Socialx" is a Social Engineering And Remote Access Trojan Tool. You can generate fud backdoor and you can embed any file you want inside…☆321Updated 3 years ago
- PhishX - The Complete Spear Phishing Tool☆109Updated 6 years ago
- Community-built scenarios for Wifiphisher☆363Updated 4 years ago
- Sinister is Windows/Linux Keylogger Generator which sends key-logs via email with other juicy target info☆456Updated 8 months ago
- Simple script masks the phishing link under the normal URL☆83Updated 4 years ago
- Big-Papa is a remote cookie stealer which can then be used for session hijacking and Bypassing 2 Factor Authentication☆103Updated 3 years ago
- Automated Payload Generator Tool☆107Updated 4 years ago
- Chrome Keylogger Extension | Post Exploitation Tool☆430Updated 3 years ago
- A backdoor with a multitude of features.☆281Updated 8 months ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆744Updated 5 years ago
- Samples Phishing tools made for Linux it contains 30 different type of Phishing Pages made with flask☆106Updated 3 years ago
- Hide your payload into .jpg file☆394Updated 3 years ago
- Python Tutorial - || Advanced Keylogger || Code Walk-through || Hacking/Info-Sec ||☆86Updated 5 months ago
- A simple wordlists generator and mangler written in Python 3.10.1.☆123Updated last year
- Python wordlist generator☆169Updated 3 years ago
- Gloom-Framework :: Linux Penetration Testing Framework☆50Updated 7 years ago
- A Phishing Dropper designed to Pentest.☆272Updated 8 years ago
- Undetectable helps you to generate fully undetectable payload of metasploit which can bypass android antivirus.☆109Updated last year
- Script to generate Android App that can hijack autenticated sessions in cookies☆182Updated 6 years ago
- Fake-AP to perform Evil Twin Attack☆60Updated 6 years ago