python keylogger and spying malware .
☆15Apr 24, 2025Updated 10 months ago
Alternatives and similar repositories for SPY
Users that are interested in SPY are comparing it to the libraries listed below
Sorting:
- Silently logs and E-mails all incoming/outgoing calls and text messages while doubling up as a flashlight app. The app also has the abili…☆24Mar 31, 2021Updated 4 years ago
- an IOS tweaks app using only SwiftUI☆12Feb 4, 2023Updated 3 years ago
- "ImpELF: A Python-based ELF hashing utility that generates unique fingerprints for ELF binaries using their imported functions and librar…☆15Dec 26, 2023Updated 2 years ago
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆33Apr 14, 2025Updated 10 months ago
- Advanced spyware controlled by email/telegram. Includes keylogging, mouse activity with position and screenshot, screenshots and processe…☆30Jan 20, 2026Updated last month
- A python trojan with spyware, info stealing and ransomware abilities.☆34Sep 12, 2025Updated 5 months ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Oct 21, 2023Updated 2 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Nov 22, 2025Updated 3 months ago
- This is my custom wordlist for WiFi passwords, tailored specifically for WiFi networks in Indonesia.☆13Nov 29, 2025Updated 3 months ago
- Python library to generate and validate credit card numbers. Features a fast, offline BIN lookup using a local database. Zero dependencie…☆47Aug 3, 2025Updated 7 months ago
- Proof of Concept Code for CVE-2023-32353: Local privilege escalation via iTunes in Windows☆34Jun 9, 2023Updated 2 years ago
- A guide about building virtual assistants by using General Bots.☆16Feb 19, 2026Updated 2 weeks ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- Online Judge that accepts a solution and judges it as Accepted, Compilation Error, Runtime Error, Time Limit Exceeded or Wrong Answer.☆14Mar 10, 2023Updated 2 years ago
- EMVLogger is an open-source tool for testing and analyzing EMV chip cards and transaction logs using a comprehensive EMV Kernel Library. …☆13Jun 15, 2024Updated last year
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- Basic password cracker. These tools can be used to crack various types of password hashes, the program applies the technique to recover t…☆10Mar 22, 2023Updated 2 years ago
- ☆10Oct 3, 2019Updated 6 years ago
- functions to exploit common web application vulnerabilities such as SQL Injection, Cross-Site Scripting (XSS), Server-Side Request Forger…☆93Apr 21, 2024Updated last year
- Eficaz herramienta capaz de inyectar un backdoor a casi cualquier app Android actual☆40Oct 26, 2020Updated 5 years ago
- ☆13Apr 2, 2023Updated 2 years ago
- In accordance with survey reports, the growth of online business worldwide is significantly faster and higher in comparison with traditio…☆13Jul 30, 2023Updated 2 years ago
- This Is A Python Script That Forwards SMS Messages To A Discord Webhook☆10Feb 22, 2024Updated 2 years ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆40Apr 1, 2025Updated 11 months ago
- emv software clone datas DUMPS from original card holder to chip blank card jcop any new generation blank card☆15Oct 25, 2017Updated 8 years ago
- Hardware Design for the Super Magfest 2024 Swadge☆13May 4, 2024Updated last year
- Networking Tools for Calculations & Scans☆12Dec 11, 2023Updated 2 years ago
- A collection of CyberChef recipes for decoding and decrypting strings in HTML attachments☆10Jul 10, 2024Updated last year
- A modern, full-stack digital menu management system built with Next.js 14. Create and customize digital menus, generate QR codes, and ana…☆21Feb 25, 2026Updated last week
- An ESPHome component for accepting a secret PIN over Bluetooth LE.☆11Apr 7, 2024Updated last year
- Expanded version of the Espressif ESP webcam☆15Oct 7, 2020Updated 5 years ago
- SSH brute-forcing tool written in python☆14Feb 10, 2023Updated 3 years ago
- ☆11May 30, 2018Updated 7 years ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆11May 6, 2023Updated 2 years ago
- One of the best Grabbers to get the Passwords, Cookies and tokens from your friends ;)☆10Aug 29, 2023Updated 2 years ago
- Food Delivery App Front-End Using React JS☆13Mar 26, 2024Updated last year
- WordPress plugin to create & manage the tours, hotels, transportation service at ease. Specialized designed for travel & tour company - a…☆10Apr 18, 2018Updated 7 years ago
- Infosint is an open source intelligence tool which is used to trace IP address and generate heatmap and can able to find a social media a…☆43Jun 20, 2021Updated 4 years ago