Harinarayana360 / keylogger
A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record each keystroke on a specific computer. Keylogger software is also available for use on smartphones, such as the Apple iPhone and Android devices.
☆10Updated 9 months ago
Alternatives and similar repositories for keylogger:
Users that are interested in keylogger are comparing it to the libraries listed below
- The Vulnerability Assessment project aims to identify and address security vulnerabilities in a Windows 10 virtual machine (VM). Using N…☆12Updated last year
- Wi-Fi Deauther is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as scanning, deau…☆35Updated last year
- It is a advanced keylogger.☆48Updated 10 months ago
- A network scanner project. The idea was from cybercademy.org. [Still not complete, will work on during the summer break]☆50Updated 3 weeks ago
- This repository holds some very beginner projects that I worked on related to cybersecurity.☆14Updated 7 months ago
- 0xCipherLink ensures safe and encrypted file sharing using AES-256 encryption and PBKDF2 key derivation. With a user-friendly Tkinter int…☆11Updated 10 months ago
- Wi-Fi Deauthentication Tool is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as s…☆52Updated last year
- a simple keylogger in python that sends the keystrokes to the server (Telegram)☆13Updated 3 months ago
- J.P. Morgan Cybersecurity Virtual Experience Program☆8Updated 3 years ago
- Welcome Hackers, this is your go-to resource for learning cybersecurity stuff everyday :)☆30Updated this week
- Bash For Ethical Hacking☆56Updated 2 years ago
- A step-by-step walkthrough of different machines "pwned" on the CTF-like platform, HackTheBox.☆46Updated 2 years ago
- ☆16Updated 10 months ago
- ☆23Updated last year
- This is my personal repo, which includes bug bounty tips, a collection of tools, one-liners, and other resources I personally prefer whil…☆49Updated 2 weeks ago
- Minimalist notes for CEH-practical Cert.☆32Updated 2 years ago
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆182Updated last year
- Auto Recon tool for finding SQLi,XSS,LFi,OpenRedirect☆36Updated 2 months ago
- BUG HUNTING/WEB APPLICATION PENTESTING CHECKLIST☆15Updated last year
- Cross-Site Scripting (XSS) injects malicious scripts into trusted websites via user input. Attacker-sent scripts run in users' browsers, …☆41Updated last year
- This repo is a helpful starting point for those interested in exploring the world of Android hacking and bug bounties. The resources ment…☆200Updated 5 months ago
- Top 5 ethical hacking books to get started? Top 5 practical hacking books? Top 5 cybersecurity books to get started? Did I miss any great…☆173Updated last year
- Since the SecOps Group has offered free certification to Certified Appsec Practitioner I will be creating notes here. I will be working o…☆51Updated last year
- Ethical Hacking Roadmap 🌐🔒☆10Updated last year
- A collection of slides and presentations from BSides Ahmedabad 2024, held on October 12th and 13th. This repository features key insights…☆37Updated 6 months ago
- Burp-Suite Professional v1.7.37 Cracked☆18Updated last month
- Hacking and Cyber Security Ebooks | For More Visit -☆86Updated 5 years ago
- All in one web Recon app☆39Updated 10 months ago
- Minimalist resources to learn about pentesting smart contracts, from lab to practice, ctf and some recommendations.☆17Updated 2 years ago
- Welcome to the 403 and 401 Bypass Techniques and Bug Bounty Tips repository! This repo is a collection of methods and strategies to bypas…☆16Updated 4 months ago