An efficient spyware that is barely undetectable by antiviruses and get execute every time the computer start.
☆22Apr 18, 2024Updated 2 years ago
Alternatives and similar repositories for megaloptera
Users that are interested in megaloptera are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- It is a advanced keylogger.☆77Jul 2, 2024Updated last year
- Scanner and attack suite for hosts that forward unauthenticated packets via IPIP and GRE protocols. (CVE-2020-10136 CVE-2024-7595)☆11Jan 22, 2025Updated last year
- Esta programada totalmente por mi, su uso es muy sencillo, 5 opciones que te ayudarán a obtener información de un nick, ip, nombre y demá…☆17Aug 19, 2023Updated 2 years ago
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- Sample code for exfiltrating data through an XSS vulnerability. XSS Payload retrieves sensitive data in victim's browser, then breaks it …☆21May 11, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Fairly Undetectable Linux Spyware☆18Mar 1, 2023Updated 3 years ago
- Autoconnect MSR-100 Magnetic Stripe Card Reader and returns CardInfo on Swipe event.☆13Sep 26, 2022Updated 3 years ago
- API for voter registration status and sample ballots in Michigan.☆12Jan 7, 2026Updated 3 months ago
- Creates the initial scope of files and directories/folders of a web site for Spiders/Robots/Crawlers☆16Sep 8, 2013Updated 12 years ago
- This easy-to-use script collects all the flags for the Hacker101 CTF problem "Encrypted Pastebin"☆18May 14, 2025Updated 11 months ago
- KeyloggerScreenshot is an intelligent tool which logs keys, makes a Screenshot every 20 seconds, recordes the mouse click with x and y po…☆147Oct 28, 2025Updated 6 months ago
- Trojan Rat Builder(348), Ransomware Builder(17), Crypter(110), Miner(9), Worm(8), Botnet(49), Virus Builder(62), Binder(35), Exploit(42),…☆20Mar 29, 2022Updated 4 years ago
- ☠ 😈 👀 Simple,Secure & Undetected (6.11.2017) keylogger for Windows :)☆47Jan 16, 2018Updated 8 years ago
- ☆13Dec 21, 2019Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- OSINT tool for domain discovery☆10Apr 5, 2024Updated 2 years ago
- A WiFi hacking Phishing tool for everyone.☆15Mar 31, 2023Updated 3 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆22Jun 3, 2014Updated 11 years ago
- Code for scraping obituaries from Legacy.com. 3 steps: scrape URLs & paragraphs then extract age, sex, & race☆13Dec 9, 2022Updated 3 years ago
- Python-based spyware for Windows that logs the foreground window activites, keyboard inputs. Furthermore it is able to take screenshots a…☆67Jun 20, 2019Updated 6 years ago
- Botnet malware designed to infect and control a set of raspberry PIs. For educational purposes only.☆14May 23, 2018Updated 7 years ago
- Knative common scripts.☆26Apr 28, 2026Updated last week
- A Node.js wrapper for the Google WiFi API☆14Oct 25, 2021Updated 4 years ago
- a simple keylogger that records hardware inputs like keyboard, mouse, microphone and webcam and sends it to your e-mail.☆18Oct 18, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- This project is for internal purposes only and not meant to be public; it is not meant to be made private either. Such is life—complicate…☆15Jul 22, 2025Updated 9 months ago
- 🐛 A list of writeups from the Google VRP Bug Bounty program☆12Jun 10, 2025Updated 10 months ago
- ☆11Jan 4, 2023Updated 3 years ago
- A Simple Python Extractor, Decompiler, Deobfuscator, and Disassembler that helps you Reverse Engineer Python-Based Malware, Viruses, Rans…☆61Jun 4, 2022Updated 3 years ago
- Hey guys This a bash script tool to connect ssh Easily without any commands☆11Dec 6, 2023Updated 2 years ago
- Messing around with XDP and eBPF☆20Oct 7, 2021Updated 4 years ago
- Tutorials for crime mapping in R☆14Jan 8, 2025Updated last year
- Welcome to h4cker_b00k, a sheet where the write up's of different CTF's are to learn ethical hacking...☆15Updated this week
- My personalized Hosts file collection of various sources, cleaned and optimized specially for pDNSf☆31Updated this week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Tool to judge an N64 ROM for correctness, and fix broken ones.☆12Jun 7, 2023Updated 2 years ago
- Hopefully avoid Pegasus spyware's zero-click iOS exploit "FORCEDENTRY"☆31Dec 28, 2021Updated 4 years ago
- A python trojan with spyware, info stealing and ransomware abilities.☆34Sep 12, 2025Updated 7 months ago
- THIS REPOSITORY ONLY MADE FOR PROVIDING SPOOFING CALL AND EMAIL☆12Oct 1, 2023Updated 2 years ago
- Use the Google People's (Contacts) API to fetch email addresses from a large contacts directory and from personal contacts & write them t…☆20Sep 19, 2025Updated 7 months ago
- Archiving tool for Google Photos☆16Apr 22, 2026Updated last week
- JavaScript reincarnation of Google Cache Browser☆49May 27, 2022Updated 3 years ago