Debang5hu / keylogger
a simple keylogger in python that sends the keystrokes to the server (Telegram)
☆13Updated 2 months ago
Alternatives and similar repositories for keylogger:
Users that are interested in keylogger are comparing it to the libraries listed below
- The Vulnerability Assessment project aims to identify and address security vulnerabilities in a Windows 10 virtual machine (VM). Using N…☆10Updated last year
- It is a advanced keylogger.☆42Updated 9 months ago
- A network scanner project. The idea was from cybercademy.org. [Still not complete, will work on during the summer break]☆45Updated 4 months ago
- Wi-Fi Deauther is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as scanning, deau…☆32Updated last year
- Wi-Fi Deauthentication Tool is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as s…☆48Updated last year
- Minimalist notes for CEH-practical Cert.☆31Updated 2 years ago
- Minimalist resources to learn about pentesting smart contracts, from lab to practice, ctf and some recommendations.☆15Updated 2 years ago
- This repository holds some very beginner projects that I worked on related to cybersecurity.☆12Updated 6 months ago
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆10Updated 8 months ago
- ☆21Updated 2 years ago
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆22Updated 3 years ago
- This repository is aimed to contain all basic tools and resources for cybersecurity. In this repository you will get all material which y…☆60Updated 5 months ago
- A step-by-step walkthrough of different machines "pwned" on the CTF-like platform, HackTheBox.☆45Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆79Updated 5 months ago
- A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in dis…☆35Updated last week
- this repo contains complete road map For become a Ethical Hacker For completely for free. Share this repo with your Friends.☆48Updated 3 months ago
- Study material (pdfs, notes, free course download links etc) for HACKERS☆17Updated last year
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools th…☆51Updated 4 years ago
- ☆16Updated last year
- POC Pdf-exploit builder on C#☆13Updated last year
- A tool for automatically change the Tor IP address over time. Maximize anonymity!☆72Updated 2 weeks ago
- Educational repository with source code examples☆13Updated last year
- Proof of concept : CVE-2024-1071: WordPress Vulnerability Exploited☆14Updated 7 months ago
- KeyloggerScreenshot is an intelligent tool which logs keys, makes a Screenshot every 20 seconds, recordes the mouse click with x and y po…☆46Updated 10 months ago
- ☆40Updated last year
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆59Updated 11 months ago
- a list of 350+ Free TryHackMe rooms to start learning cybersecurity with THM☆9Updated last year
- Burp-Suite Professional v1.7.37 Cracked☆18Updated 3 weeks ago
- PassBreaker☆60Updated 11 months ago
- roadmap for being a self-taught hacker☆7Updated last year