Sinister
Keylogger Malware Generator
A tool that generates and deploys a keylogger malware that sends keystrokes and device information via email to an attacker.
Sinister is Windows/Linux Keylogger Generator which sends key-logs via email with other juicy target info
448 stars
23 watching
91 forks
Language: Python
last commit: 5 months ago
Linked from 1 awesome list
advancedantivirus-killerbinderbuilt-in-binderdisable-security-centerhackingkali-linuxkeyloggerlinuxpersistencepythonscreenshotssends-screenshotssinisterspywarespyware-generatortechnowloggerwindows
Related projects:
Repository | Description | Stars |
---|---|---|
| A tool that scans for accessibility tools backdoors via Remote Desktop Protocol (RDP) by simulating key presses to launch them on Windows systems. | 331 |
| A tool to record and log keyboard key presses in the Linux kernel | 641 |
| An assistant tool designed to create malicious MS Office documents by hiding or tampering with VBA macros and macro analysis tools | 2,131 |
| A tool designed to intercept and record keystrokes on Windows systems, sending logs via Gmail. | 1,028 |
| A tool for generating malware payloads using MSBuild and PowerShell, allowing for conditional execution based on user domain or registry conditions. | 1,480 |
| A macOS application that monitors keyboard inputs and clipboard changes, taking screenshots at customizable intervals. | 78 |
| Automates the creation of Yara rules to detect malware and other malicious objects of interest by analyzing sample files from various sources. | 332 |
| A device that secretly captures keystrokes from nearby Microsoft wireless keyboards using RF signals. | 1,099 |
| A tool designed to make physical devices detectable by malware and create a deceptive environment for evasion techniques. | 382 |
| Generates malicious macros to bypass application whitelisting and execute powershell or shellcode via MSBuild. | 495 |
| A tool that generates invalid signatures to test antivirus software's signature verification and validation capabilities. | 2,137 |
| A collection of threat intelligence resources and tools for analyzing APT malware | 257 |
| A command-line tool for analyzing malware and disassembling binary files | 386 |
| A tool used to create and manipulate Excel documents containing malicious macros. | 514 |
| An exploit tool that allows users to compromise certain wireless keyboard and mouse devices by sending malicious keystrokes. | 815 |