0301yasiru / YKEY_keyloggerLinks
This is a small framework for generate and listen to Keylogger malwares... And also the most effective and most useful feature about this Keylogger malwares is they don't communicate through email with the hackers. It uses a MYSQL databases to communicate. So you will not face to any email issues. Not only that but also using this framework you …
☆19Updated 5 years ago
Alternatives and similar repositories for YKEY_keylogger
Users that are interested in YKEY_keylogger are comparing it to the libraries listed below
Sorting:
- Eficaz herramienta capaz de inyectar un backdoor a casi cualquier app Android actual☆38Updated 4 years ago
- Your eyes on the target - SPY☆25Updated 4 years ago
- This is a keylogger that collects all the data and e-mail it in a set time with system information which includes device S/N and hardware…☆47Updated 2 years ago
- Keylogger for ethical hackers☆15Updated 3 years ago
- An Android spyware which interacts with a remote C&C server to exfiltrate phone data☆75Updated 5 years ago
- Just Mod Version of lokiboard with remote reporting via Gmail☆44Updated 5 years ago
- Full Auto Exploit tool to SQL Injection: Admin Find -dork generation and grab from cx-Security and proxy cheaker and more :)☆29Updated 7 years ago
- PhishLog is a penetration testing and red teaming tool that automates the setup of a live keylogger that could be used with phishing camp…☆30Updated 6 years ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Updated 4 years ago
- Simple but sharp ransomware☆35Updated 5 years ago
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆18Updated 4 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆56Updated 7 years ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆19Updated 3 years ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆63Updated 5 years ago
- Phishing mobile application made in React Native for both Android and iOS devices.☆34Updated 3 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆53Updated 4 years ago
- this FUD Payload☆39Updated 3 years ago
- Fast exploitation based on metasploit.☆74Updated 5 years ago
- javascript botnet browser chrome firefox V2 is a keylogger to capture card number ,expiration date,CVV any web site ,paypal,facebook,e-co…☆77Updated 4 years ago
- Ro3b - Advance Banking HTTP Botnet☆52Updated 2 years ago
- reverse shell + keylogger + wifis password stealing + screen sharing + camera sharing☆30Updated 4 years ago
- Hacking Tools Z0172CK☆31Updated 2 years ago
- Fud Persistent Windows Backdoor developed purely in python☆30Updated 4 years ago
- phishfactory offers a variety of email templates for spear-phishing attacks. [more templates to still be added]☆21Updated 4 years ago
- This is a combination of a hacking and a cracking tool.☆33Updated 4 years ago
- Loki.Rat is a fork of the Ares RAT, it integrates new modules, like recording , lockscreen , and locate options. Loki.Rat is a Python Rem…☆77Updated 2 years ago
- A Simple Keylogger☆18Updated 6 years ago
- (Windows/Linux/Mac) Remote Administration Tool☆65Updated 4 years ago
- 👨🏻💻 A great tool for Ethical Hackers, a malware programmed with Backdoor and Keylogger.☆41Updated 4 years ago
- Ashok is a Osint Reconnaissance Tool , a.k.a swiss knife for Reconnaissance , A tool for every beginner/pentester in their penetration t…☆26Updated 5 years ago