Kill0geR / KeyloggerScreenshotLinks
KeyloggerScreenshot is an intelligent tool which logs keys, makes a Screenshot every 20 seconds, recordes the mouse click with x and y positioning and records the audio of the target. The data will be sent to you via peer to peer connection. One of the safest and anonymous Keyloggers on GitHub. Check out my page to build your own server
☆127Updated 2 months ago
Alternatives and similar repositories for KeyloggerScreenshot
Users that are interested in KeyloggerScreenshot are comparing it to the libraries listed below
Sorting:
- Here are +200 different rats some with source code☆138Updated 2 years ago
- DarkCool All Tools For Hacking Activity! List:~ Exploiter, Checker, Webshell Finder, Grabber, Searching, Bruteforce, Random, And Others T…☆170Updated last year
- Clipboard poisoning attack.☆57Updated 5 years ago
- Nmap & SQL injection automation tool☆39Updated last year
- A social engineering toolkit for performing smishing, and other sms attacks☆104Updated last year
- A Sophisticated, Automated, AI-Driven, State-Sponsored Cyber-Espionage/Counter-Espionage & Zero Click AI-Gen Supply Chain Attack Framewor…☆62Updated 8 months ago
- Redirect All Traffic Through Tor Network For Kali Linux☆209Updated 9 months ago
- A tool for automatically change the Tor IP address over time.☆123Updated 9 months ago
- Boost website hits by generating requests from multiple proxy IPs.☆75Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆69Updated 4 years ago
- A framework like a metasploit containg a variety of modules for pentesting or ethical hacking. This repo willl be updated and new modules…☆189Updated 7 months ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆177Updated last year
- Tracer is an OSINT tool that can be used to detect on which websites a username is currently in use☆118Updated 2 years ago
- IPAnalyzer is an IP Address Tracker OSINT ethical hacking tool built for Linux distributions, designed to gather detailed information abo…☆53Updated last month
- A computer programming AI bot in python django☆55Updated last year
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆103Updated 2 months ago
- It is an automated phishing tool that includes more than 30 phishing templates.☆98Updated last year
- Embed malware, apks, executables or any other binary file into a PDF, or generate a PDF with malicious link encrusted.☆106Updated 2 years ago
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability ass…☆43Updated 3 months ago
- NetRadar is a Networking tool focused on mapping local and WiFi networks. It provides detailed information about connected devices, open …☆141Updated 2 years ago
- This is a exploit with the capability to control ip camera movement even without a username and password.☆74Updated 9 months ago
- PIP-INTEL is an OSINT (Open Source Intelligence) tool designed using various open-source tools and pip packages.☆188Updated last year
- 🔮 Python Remote administration tool via telegram☆55Updated 8 months ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆112Updated 3 months ago
- What is Phone Track? So phonetrack is a type of OSINT that is used to track someone's location just based on their telephone number☆84Updated 2 years ago
- 🕵️ Track down social media profiles using a specific username across multiple social network platforms☆62Updated 3 weeks ago
- 🚀 This is a collection of hacking🔥 and pentesting 🧐 scripts to help with enumeration, OSINT, exploitation and post exploitation autom…☆181Updated last year
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆65Updated last year
- An Excellent OSINT tool to get information of any ip address. All details are explained in below screenshot☆268Updated last year
- Hacking with PasteJacking technique☆22Updated last year