0301yasiru / YKEY_keylogger
This is a small framework for generate and listen to Keylogger malwares... And also the most effective and most useful feature about this Keylogger malwares is they don't communicate through email with the hackers. It uses a MYSQL databases to communicate. So you will not face to any email issues. Not only that but also using this framework you …
☆19Updated 5 years ago
Alternatives and similar repositories for YKEY_keylogger
Users that are interested in YKEY_keylogger are comparing it to the libraries listed below
Sorting:
- Just Mod Version of lokiboard with remote reporting via Gmail☆44Updated 4 years ago
- PhishLog is a penetration testing and red teaming tool that automates the setup of a live keylogger that could be used with phishing camp…☆30Updated 6 years ago
- Keylogger for ethical hackers☆15Updated 3 years ago
- This is a keylogger that collects all the data and e-mail it in a set time with system information which includes device S/N and hardware…☆45Updated last year
- Phishing mobile application made in React Native for both Android and iOS devices.☆32Updated 3 years ago
- ATANK is a android ransomware builder☆70Updated 4 years ago
- (Windows/Linux/Mac) Remote Administration Tool☆64Updated 4 years ago
- Your eyes on the target - SPY☆26Updated 4 years ago
- Linux bash script automation for metasploit☆10Updated 9 years ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Updated 4 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆54Updated 7 years ago
- Stealph-botnet its a simpel botnet i code this for fun☆26Updated 4 years ago
- 19 Social Media Phishing Pages #phishing #shellphish #phish☆14Updated 4 years ago
- Anubis 7.0☆25Updated 7 months ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Updated 4 years ago
- phishfactory offers a variety of email templates for spear-phishing attacks. [more templates to still be added]☆21Updated 4 years ago
- Hacking Tools Z0172CK☆31Updated last year
- Eficaz herramienta capaz de inyectar un backdoor a casi cualquier app Android actual☆37Updated 4 years ago
- Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .☆45Updated 6 years ago
- first program python to steal password microsoft edge all version browser, send info to email☆15Updated 4 years ago
- Ro3b - Advance Banking HTTP Botnet☆49Updated last year
- An advance keylogger that works and also logs special keys.☆19Updated 2 years ago
- HTML WannaCry Ransomware v2.0 - websites defacement injection page☆26Updated 3 years ago
- reverse shell + keylogger + wifis password stealing + screen sharing + camera sharing☆28Updated 4 years ago
- PHP SMS Sender Only Script And API☆26Updated 7 years ago
- Payload delivery via URL and some social engineering.☆17Updated 10 months ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆18Updated 2 years ago
- Generate Professional Phishing Emails Fast And Easy☆26Updated 3 years ago
- Ashok is a Osint Reconnaissance Tool , a.k.a swiss knife for Reconnaissance , A tool for every beginner/pentester in their penetration t…☆26Updated 5 years ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆62Updated 5 years ago