python keylogger and spying malware .
☆15Apr 24, 2025Updated last year
Alternatives and similar repositories for SPY
Users that are interested in SPY are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Advanced spyware controlled by email/telegram. Includes keylogging, mouse activity with position and screenshot, screenshots and processe…☆30Jan 20, 2026Updated 3 months ago
- Remote persistent keylogger for Windows and Linux..☆12Aug 21, 2022Updated 3 years ago
- Silently logs and E-mails all incoming/outgoing calls and text messages while doubling up as a flashlight app. The app also has the abili…☆25Mar 31, 2021Updated 5 years ago
- ⌨️ A simple python code that you can use to make an effective keylogger.☆11Nov 7, 2020Updated 5 years ago
- ⌨️ A keylogger is nothing more than a memorizer of actions produced on the keyboard: its translation from English is in fact “keylogger”.☆11Oct 24, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated last year
- an IOS tweaks app using only SwiftUI☆14Feb 4, 2023Updated 3 years ago
- "ImpELF: A Python-based ELF hashing utility that generates unique fingerprints for ELF binaries using their imported functions and librar…☆15Dec 26, 2023Updated 2 years ago
- Web File Manager☆11Aug 21, 2025Updated 8 months ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Oct 21, 2023Updated 2 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆35Apr 14, 2025Updated last year
- A python trojan with spyware, info stealing and ransomware abilities.☆34Sep 12, 2025Updated 7 months ago
- Powerful Drone Detection for Android☆10Aug 26, 2025Updated 8 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆11May 6, 2023Updated 2 years ago
- This Is A Python Script That Forwards SMS Messages To A Discord Webhook☆11Feb 22, 2024Updated 2 years ago
- ☆10Oct 3, 2019Updated 6 years ago
- A scraper for the receive-smss.com service☆13Apr 14, 2026Updated 2 weeks ago
- 📧 Python script to forward emails using Gmail.☆10Apr 4, 2023Updated 3 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- Basic password cracker. These tools can be used to crack various types of password hashes, the program applies the technique to recover t…☆10Mar 22, 2023Updated 3 years ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- Devices on the local network can be added as a 'thing' in the Candle Controller / WebThings Gateway. Automations can then respond to thei…☆12Feb 9, 2026Updated 2 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- A minimal keylogger that accurately tracks keyboard strokes made in Python☆24Feb 23, 2021Updated 5 years ago
- Writing Spyware Made Easy - POC spyware Chrome Extension/Server☆40Apr 8, 2018Updated 8 years ago
- A collection of CyberChef recipes for decoding and decrypting strings in HTML attachments☆10Jul 10, 2024Updated last year
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- a python script which asks you for login and ask any other email_id . it downloads all attachments of inbox came from that other email_i…☆11Dec 22, 2017Updated 8 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- This contains common OSCP local exploits and enumeration scripts☆12Sep 18, 2015Updated 10 years ago
- minimalist sudo alternative: multi-user privilege escalation tool in three letters☆10Jul 5, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Python library to generate and validate credit card numbers. Features a fast, offline BIN lookup using a local database. Zero dependencie…☆52Aug 3, 2025Updated 9 months ago
- Networking Tools for Calculations & Scans☆12Dec 11, 2023Updated 2 years ago
- One of the best Grabbers to get the Passwords, Cookies and tokens from your friends ;)☆10Aug 29, 2023Updated 2 years ago
- This is my custom wordlist for WiFi passwords, tailored specifically for WiFi networks in Indonesia.☆17Nov 29, 2025Updated 5 months ago
- Virus Package ( For Educational Purposes )☆37Aug 2, 2021Updated 4 years ago
- dedsec admin is a piso wifi admin username and password stealer tool☆11Dec 10, 2023Updated 2 years ago
- Gmail shell, for hackers execute commands via gmail☆20Feb 3, 2021Updated 5 years ago