Debang5hu / keylogger
a simple keylogger in python that sends the keystrokes to the server (Telegram)
☆13Updated 3 months ago
Alternatives and similar repositories for keylogger:
Users that are interested in keylogger are comparing it to the libraries listed below
- The Vulnerability Assessment project aims to identify and address security vulnerabilities in a Windows 10 virtual machine (VM). Using N…☆12Updated last year
- It is a advanced keylogger.☆46Updated 9 months ago
- A network scanner project. The idea was from cybercademy.org. [Still not complete, will work on during the summer break]☆49Updated 2 weeks ago
- Wi-Fi Deauther is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as scanning, deau…☆35Updated last year
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆10Updated 8 months ago
- This repository holds some very beginner projects that I worked on related to cybersecurity.☆14Updated 7 months ago
- Wi-Fi Deauthentication Tool is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as s…☆51Updated last year
- this repo contains complete road map For become a Ethical Hacker For completely for free. Share this repo with your Friends.☆48Updated 3 months ago
- KeyloggerScreenshot is an intelligent tool which logs keys, makes a Screenshot every 20 seconds, recordes the mouse click with x and y po…☆72Updated this week
- Bash For Ethical Hacking☆54Updated 2 years ago
- A step-by-step walkthrough of different machines "pwned" on the CTF-like platform, HackTheBox.☆45Updated 2 years ago
- This repository is aimed to contain all basic tools and resources for cybersecurity. In this repository you will get all material which y…☆60Updated 6 months ago
- Minimalist notes for CEH-practical Cert.☆32Updated 2 years ago
- Minimalist resources to learn about pentesting smart contracts, from lab to practice, ctf and some recommendations.☆16Updated 2 years ago
- A tool for automatically change the Tor IP address over time.☆79Updated 2 weeks ago
- Elevate your bookmarking game with my latest Bookmark Toolkit. Engineered for ethical bookmarking and enhanced web exploration, it delive…☆34Updated 3 weeks ago
- Tool for automate bug hunting process 🔍 --> 🍭☆40Updated 8 months ago
- The Complete Mobile Ethical Hacking, by EC-Council☆34Updated 4 years ago
- SubnetWizard is a Python Based CLI tools for subnet calculating☆51Updated last year
- 0xCipherLink ensures safe and encrypted file sharing using AES-256 encryption and PBKDF2 key derivation. With a user-friendly Tkinter int…☆11Updated 9 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆40Updated 2 years ago
- This is my personal repo, which includes bug bounty tips, a collection of tools, one-liners, and other resources I personally prefer whil…☆43Updated last month
- ☆15Updated 9 months ago
- Herramienta de ingeniería social (Creador de puerta trasera con Reverse Shell para Windows/Android) con Ngrok.☆74Updated 2 years ago
- Enter Morpheus, your advanced IOC detection tool. Powered by expert YARA rules and integrated with VirusTotal, it scans and identifies In…☆49Updated 2 months ago
- CompTIA Security+ SY0-601 notes (passed 788 points)☆44Updated 5 months ago
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API…☆38Updated 4 months ago
- This script is designed for educational purposes only and allows users to simulate a DDoS attack. Please note that hacking is illegal and…☆215Updated 3 months ago
- ☆18Updated 2 years ago
- CyberSec Resources: FRAMEWORKS & STANDARDS; Pentesting Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds, CTF, OSINT, Pentest tools,…☆26Updated 2 years ago