A keylogger for Windows, developed as part of the "Build an Advanced Keylogger using C++ for Ethical Hacking!" course on Udemy
-
Updated
Oct 11, 2017 - C++
A keylogger for Windows, developed as part of the "Build an Advanced Keylogger using C++ for Ethical Hacking!" course on Udemy
Ethical Hacking tools
Ethical hacking monitor that records keyboard input into a text file.
It includes coding of famous ciphers in simplified and generalized manner
Ethical hacking device that grabs WIFI passwords and sends them as plain text to a webhook page to be retrieved later.
Hidden Eye is an all in one tool that can be used to perform a variety of online attacks on user accounts. It’s well loaded, therefore it can be used as keylogger (keystroke logging), phishing tool, information collector, social engineering tool, etc.
The program aims to work as a basic keylogger that will log all keyboard and mouse inputs into string that will then be transfer into a Powershell command, written into the C++ code, that will send the email, with attached key strokes, to the designated email address.
Enhance cybersecurity defenses with a specialized solution tackling a Capture the Flag challenge involving decryption of an encrypted message with a 2-bit key length using a C++ brute-force method.
Dump a process memory and extract data based on regular expressions.
Penetration testing utility and antivirus assessment tool.
Windows OS keylogger with a hook mechanism (i.e. with a keyboard hook procedure).
FDos but c++ version
ETHICAL-HACKING
Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations.
A program that uses a captive portal to phish Facebook accounts when users connect to the WiFi network.
TorrentSpyder is a command-line utility designed to retrieve Torrent Download History based on a specified IP address.
🕵️♂️Stealth Key Logger🔑
InjectionLab is an educational toolkit showcasing various Windows code injection techniques. It provides well-documented examples for security researchers and defenders to explore process injection, memory manipulation, and detection strategies.
Add a description, image, and links to the ethical-hacking topic page so that developers can more easily learn about it.
To associate your repository with the ethical-hacking topic, visit your repo's landing page and select "manage topics."