Remote persistent keylogger for Windows and Linux..
☆12Aug 21, 2022Updated 3 years ago
Alternatives and similar repositories for Loger
Users that are interested in Loger are comparing it to the libraries listed below
Sorting:
- WEB SQLi Injection DB Dumper DATA Hacking Tool☆12Oct 1, 2019Updated 6 years ago
- A powerful keylogger records all keystrokes including some special keys and send them to gmail.☆13Feb 24, 2022Updated 4 years ago
- A tool to BruteForce ssh. An upgraded version of Hydra. Multiple bruteforce options☆11Jul 9, 2022Updated 3 years ago
- steal chrome saved passwords "undetectable"☆51Mar 15, 2022Updated 3 years ago
- ☆30Feb 24, 2022Updated 4 years ago
- ⌨️ A simple python code that you can use to make an effective keylogger.☆11Nov 7, 2020Updated 5 years ago
- (Hacking-Tool), All tools in one!☆13Jul 5, 2021Updated 4 years ago
- Install Metasploit-Framework in official way using this script.☆15Feb 6, 2020Updated 6 years ago
- Black-Tool-For-Windows☆15Sep 8, 2021Updated 4 years ago
- This tool serves to add the kali linux repository to the ubuntu repository instantly. So that ubuntu users can install some of the tools …☆19Apr 16, 2022Updated 3 years ago
- This tool will create a .exe file which will send you all the information of victim once the file executes!☆44Nov 24, 2024Updated last year
- A powerful password Brute Force password cracker for pentesting.☆41Feb 24, 2022Updated 4 years ago
- Fb id clone commands☆21Jul 11, 2021Updated 4 years ago
- OSINT Google search automation to find emails, names, locations and past breaches information☆19Jul 3, 2023Updated 2 years ago
- ☆21Jan 29, 2022Updated 4 years ago
- CamJacking is a tool designed for use in human penetration testing tool. It is intended to simulate potential security threats by testing…☆24Updated this week
- Hacking Camera !☆28Sep 14, 2021Updated 4 years ago
- Exploits for some of the vulnerabilities I have discovered☆19Aug 3, 2020Updated 5 years ago
- DEDSEC-VPN is a Linux-based VPN tool that hides your real IP and blocks IPv6 leaks.☆31Feb 21, 2026Updated last week
- Powerful Malware for Termux ;)☆18May 5, 2022Updated 3 years ago
- WH RAT V2 2022☆25Jan 19, 2024Updated 2 years ago
- Hacking with PasteJacking technique☆22Jul 2, 2024Updated last year
- A multifunctional Android RAT (TELEGRAM BASED)☆19Aug 2, 2022Updated 3 years ago
- ☆22Jan 11, 2026Updated last month
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆23Nov 20, 2022Updated 3 years ago
- ©PHISH LINK HIDER AND MASK LINK GENERATOR FOR TERMUX USERS☆20Aug 28, 2020Updated 5 years ago
- Gmail-Brute Force Tool ;)☆52Feb 7, 2024Updated 2 years ago
- Telegram based android RAT for Android (No Port Forwarding Required)☆26Mar 19, 2023Updated 2 years ago
- Fake-sms☆27Jun 21, 2025Updated 8 months ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆22Aug 4, 2020Updated 5 years ago
- A DDoS Attack Tool (not a real one but it can DDoS some websites).☆26Sep 25, 2022Updated 3 years ago
- ☆18Dec 2, 2023Updated 2 years ago
- A minimal keylogger that accurately tracks keyboard strokes made in Python☆24Feb 23, 2021Updated 5 years ago
- 8 DIGIT PASSWORDS CRACKER OF BANGLADESHI FACEBOOK ACCOUNTS☆25Feb 27, 2022Updated 4 years ago
- GMS-Sploit GhostManSec - Hacking Tool - 8 method hacking - GhostManS3c-Sploit v1.2-dev☆25Aug 13, 2023Updated 2 years ago
- File Clonnig☆12Apr 18, 2024Updated last year
- Facebook Account Cracker☆24Feb 27, 2022Updated 4 years ago
- Virus Repository☆28Jan 2, 2022Updated 4 years ago
- Open Sources☆28Apr 8, 2022Updated 3 years ago