0301yasiru / YKEY_keylogger
This is a small framework for generate and listen to Keylogger malwares... And also the most effective and most useful feature about this Keylogger malwares is they don't communicate through email with the hackers. It uses a MYSQL databases to communicate. So you will not face to any email issues. Not only that but also using this framework you …
☆19Updated 4 years ago
Alternatives and similar repositories for YKEY_keylogger:
Users that are interested in YKEY_keylogger are comparing it to the libraries listed below
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆17Updated 2 years ago
- Anubis 7.0☆25Updated 4 months ago
- PhishLog is a penetration testing and red teaming tool that automates the setup of a live keylogger that could be used with phishing camp…☆30Updated 5 years ago
- phishfactory offers a variety of email templates for spear-phishing attacks. [more templates to still be added]☆21Updated 4 years ago
- Phishing mobile application made in React Native for both Android and iOS devices.☆32Updated 3 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆51Updated 7 years ago
- A python server tool based on flask , this tool can phish some Facebook credentials!☆17Updated 5 years ago
- #Just simple program to spoofing device by sending malicious link☆29Updated 2 years ago
- X_INSTA Powerful INSTAGRAM Password Brute Force Tool For Windows☆31Updated 2 years ago
- ATANK is a android ransomware builder☆68Updated 3 years ago
- Automatically Scans For Default Networks & Guess The Password☆14Updated 8 years ago
- RKT DDoS is a python script for online attacking.This is a computer missile for website attacking.☆13Updated 4 years ago
- Just Mod Version of lokiboard with remote reporting via Gmail☆44Updated 4 years ago
- Bash script to show how viruses spread and to demonstrate how ransomware works.☆17Updated last year
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆21Updated 4 years ago
- This is a keylogger that collects all the data and e-mail it in a set time with system information which includes device S/N and hardware…☆45Updated last year
- 👨🏻💻 A great tool for Ethical Hackers, a malware programmed with Backdoor and Keylogger.☆39Updated 4 years ago
- Eficaz herramienta capaz de inyectar un backdoor a casi cualquier app Android actual☆37Updated 4 years ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆32Updated 4 years ago
- Ransomware builder☆85Updated 4 years ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆61Updated 4 years ago
- Keylogger for ethical hackers☆14Updated 3 years ago
- Your eyes on the target - SPY☆25Updated 4 years ago
- This is a combination of a hacking and a cracking tool.☆27Updated 3 years ago
- Stealph-botnet its a simpel botnet i code this for fun☆26Updated 4 years ago
- 19 Social Media Phishing Pages #phishing #shellphish #phish☆14Updated 4 years ago
- SMS/Email/whatsapp Bombers Collection.☆33Updated 4 years ago
- An advance keylogger that works and also logs special keys.☆18Updated 2 years ago
- Paypal phishing tool☆30Updated 6 years ago
- HTML WannaCry Ransomware v2.0 - websites defacement injection page☆25Updated 3 years ago