jackit
Keystroke logger
An exploit tool that allows users to compromise certain wireless keyboard and mouse devices by sending malicious keystrokes.
JackIt - Exploit Code for Mousejack
815 stars
59 watching
146 forks
Language: Python
last commit: over 4 years ago Related projects:
Repository | Description | Stars |
---|---|---|
| A device that secretly captures keystrokes from nearby Microsoft wireless keyboards using RF signals. | 1,099 |
| A daemon tool for detecting and mitigating unauthorized USB keystroke injection on Linux systems. | 520 |
| Analyzes Java applications for potential deserialization gadget chains to help identify vulnerabilities and prioritize remediation. | 1,005 |
| A tool to create a backdoor on a keyboard by hijacking screen locking keystrokes and injecting malicious keys into connected computers. | 85 |
| A tool that scans for accessibility tools backdoors via Remote Desktop Protocol (RDP) by simulating key presses to launch them on Windows systems. | 331 |
| A tool to learn about keystroke injection attacks and BadUSBs by emulating a USB keyboard. | 2,124 |
| A tool that exploits vulnerabilities in the password protection of Java Key Stores to crack private key passwords, | 184 |
| A tool that allows remote control of keystrokes on Windows systems via wireless USB connection using Bluetooth Low Energy technology. | 108 |
| A tool that generates and deploys a keylogger malware that sends keystrokes and device information via email to an attacker. | 448 |
| A JavaScript library that helps manage keybindings in browser applications by providing easy-to-use bindings for various actions. | 359 |
| A tool to record and log keyboard key presses in the Linux kernel | 641 |
| A macOS application that monitors keyboard inputs and clipboard changes, taking screenshots at customizable intervals. | 78 |
| A tool to identify hash types used in cryptographic algorithms | 810 |
| A tool for generating keyboard walks with configurable parameters to create efficient passwords | 552 |
| Detects vulnerability in JWT tokens by injecting an unexpected key ID field and generating tokens with one-letter secrets | 51 |