Remote persistent keylogger for Windows and Linux..
☆12Aug 21, 2022Updated 3 years ago
Alternatives and similar repositories for Loger
Users that are interested in Loger are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A powerful keylogger records all keystrokes including some special keys and send them to gmail.☆13Feb 24, 2022Updated 4 years ago
- ⌨️ A simple python code that you can use to make an effective keylogger.☆11Nov 7, 2020Updated 5 years ago
- WEB SQLi Injection DB Dumper DATA Hacking Tool☆12Oct 1, 2019Updated 6 years ago
- A minimal keylogger that accurately tracks keyboard strokes made in Python☆24Feb 23, 2021Updated 5 years ago
- Fake-sms☆28Jun 21, 2025Updated 9 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Hacking with PasteJacking technique☆22Jul 2, 2024Updated last year
- (Hacking-Tool), All tools in one!☆13Jul 5, 2021Updated 4 years ago
- ☆31Feb 24, 2022Updated 4 years ago
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 5 years ago
- python keylogger and spying malware .☆15Apr 24, 2025Updated 11 months ago
- steal chrome saved passwords "undetectable"☆51Mar 15, 2022Updated 4 years ago
- RAR-NextgenerationAI-expliot (use ai and more new techniques)☆21May 5, 2025Updated 11 months ago
- The payload will search for specific files in desktop then upload them as *zip to your web server☆37Sep 24, 2019Updated 6 years ago
- Track Location From IP.☆11Dec 25, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- LinkedIn Auto Connect Tool☆12Jan 3, 2021Updated 5 years ago
- ⌨️ A keylogger is nothing more than a memorizer of actions produced on the keyboard: its translation from English is in fact “keylogger”.☆10Oct 24, 2022Updated 3 years ago
- A powerful password Brute Force password cracker for pentesting.☆41Feb 24, 2022Updated 4 years ago
- This tool serves to add the kali linux repository to the ubuntu repository instantly. So that ubuntu users can install some of the tools …☆19Apr 16, 2022Updated 3 years ago
- Gmail-Brute Force Tool ;)☆52Feb 7, 2024Updated 2 years ago
- ☆12Feb 8, 2018Updated 8 years ago
- Exploits for some of the vulnerabilities I have discovered☆19Aug 3, 2020Updated 5 years ago
- OSINT Google search automation to find emails, names, locations and past breaches information☆19Jul 3, 2023Updated 2 years ago
- Diversos projetos voltados à Segurança Cibernética☆13Nov 17, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A multifunctional Android RAT (TELEGRAM BASED)☆19Aug 2, 2022Updated 3 years ago
- WH RAT V2 2022☆25Jan 19, 2024Updated 2 years ago
- This project focuses on Human Pose Estimation using the MoveNet model with TensorFlow Lite. The goal is to detect keypoint positions on a…☆10Jul 29, 2025Updated 8 months ago
- Black-Tool-For-Windows☆15Sep 8, 2021Updated 4 years ago
- This repository contains the python code of the keylogger which will get all the key hits by the user as well get the content from clipbo…☆12Feb 17, 2023Updated 3 years ago
- This repo contains the material pertaining to the Computer Programming course I teach at LAU☆50May 3, 2023Updated 2 years ago
- ☆22Jan 11, 2026Updated 2 months ago
- A PHP based Web application☆10Feb 11, 2023Updated 3 years ago
- JUST FOR FUN☆10Feb 13, 2023Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A JS BASED PROFILE GUESSER☆10Feb 11, 2023Updated 3 years ago
- ☆10Feb 17, 2023Updated 3 years ago
- A list of resources for those interested in getting started in bug bounties☆10Oct 28, 2022Updated 3 years ago
- ☆11Mar 23, 2023Updated 3 years ago
- Python ZIP Cracker with Bruteforce method and create file wordlist or with wordlist file☆14Jun 15, 2015Updated 10 years ago
- GMS-Sploit GhostManSec - Hacking Tool - 8 method hacking - GhostManS3c-Sploit v1.2-dev☆25Aug 13, 2023Updated 2 years ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆22Aug 4, 2020Updated 5 years ago