Debang5hu / keylogger
a simple keylogger in python that sends the keystrokes to the server (Telegram)
☆11Updated last month
Alternatives and similar repositories for keylogger:
Users that are interested in keylogger are comparing it to the libraries listed below
- ☆17Updated last year
- CyberSec Resources: FRAMEWORKS & STANDARDS; Pentesting Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds, CTF, OSINT, Pentest tools,…☆27Updated 2 years ago
- roadmap for being a self-taught hacker☆7Updated last year
- A Simple JS code to keylogger data and send it to the personal server☆22Updated 2 months ago
- It is a advanced keylogger.☆39Updated 8 months ago
- OSINT tool for username, email and domains☆27Updated 9 months ago
- Wi-Fi Deauther is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as scanning, deau…☆29Updated last year
- Minimalist resources to learn about pentesting smart contracts, from lab to practice, ctf and some recommendations.☆14Updated 2 years ago
- A network scanner project. The idea was from cybercademy.org. [Still not complete, will work on during the summer break]☆43Updated 3 months ago
- this repo contains complete road map For become a Ethical Hacker For completely for free. Share this repo with your Friends.☆45Updated 2 months ago
- A single script to install important Pentesting Tools and wordlists on Debian based Linux OS.☆18Updated last week
- Wi-Fi Deauthentication Tool is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as s…☆45Updated last year
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆57Updated 10 months ago
- An ongoing collection of awesome penetration testing (pentest) tools, software, libraries, learning tutorials, frameworks, academic and p…☆16Updated 2 years ago
- Minimalist notes for CEH-practical Cert.☆30Updated 2 years ago
- ☆21Updated 2 years ago
- A Powerfull Windows Ransomware with a Fully Undetectable Persistent Backdoor | System Halt Attack etc☆24Updated 3 years ago
- Notes for red teamers - from cloud to Active Directory to many things in between.☆57Updated last year
- This repository is aimed to contain all basic tools and resources for cybersecurity. In this repository you will get all material which y…☆60Updated 4 months ago
- POC Pdf-exploit builder on C#☆13Updated last year
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆13Updated 4 months ago
- Tool for bypassing logins vulnerable against SQL injection☆44Updated 11 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆27Updated last year
- ☆50Updated last year
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆22Updated 3 years ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆13Updated last year
- BUG HUNTING/WEB APPLICATION PENTESTING CHECKLIST☆15Updated last year
- This is an AD pentest tools collection☆54Updated 7 months ago
- This repository holds some very beginner projects that I worked on related to cybersecurity.☆11Updated 5 months ago
- Educational repository with source code examples☆13Updated last year