Sanix-Darker / KeyLy
A powerfull and awesome Keylogger(Your keyboard and your mouse) realy helpfull for hackers! :-P (C/C++)
☆19Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for KeyLy
- Much like John the Ripper, without all the fancy shit. Just reads from a wordlist and cracks those hashes.☆15Updated 4 years ago
- A HTTP bot in Java with basic commands and ability's☆10Updated 9 years ago
- BadUSB ile Penetrasyon☆12Updated 5 years ago
- A Torrent Magnet Link Scrapper☆14Updated 4 years ago
- pure python remote adb scanner + nmap scan module☆21Updated 5 years ago
- Steals chrome and firefox cookies and upload to the server using POST api.☆10Updated 8 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆15Updated 2 years ago
- electron app with remote access tool (RAT) functionality☆8Updated 6 years ago
- A simple C# md5 hash password cracker using wordlists , A Console application.☆14Updated 6 years ago
- A botnet (C&C) framework that create in bash and using crontab for periodic execute☆11Updated 7 years ago
- 🌐 "Net" — A collection of bot-nets and bot-net supplies for DOCUMENTING and ARCHIVING purposes ONLY!☆16Updated 3 years ago
- develop 1) an on-path DNS packet injector, and 2) a passive DNS poisoning attack detector. Part 1: The DNS packet injector you are goin…☆17Updated 6 years ago
- Multiple Password Generator - Unique Characters, Unique Sequences, Numbers, Uppercase, Lowercase, Symbols, Multiple Generator☆13Updated 6 years ago
- Collection of cracked malware☆14Updated 5 years ago
- A small, unfinished utility to browse and download NirSoft programs.☆18Updated 4 years ago
- A python3 script that uses cl1p website to send and receive secret messages☆27Updated 4 years ago
- This is not a real botnet, this is suppose to show how botnets work, no virus, just simple python code.☆16Updated 7 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆15Updated 7 years ago
- Bash script to crack rdp with THC-Hydra☆15Updated 3 years ago
- This project exploits Microsoft's Skype vulneribility and gets any remote user's IP address.☆10Updated 9 years ago
- Search without being tracked-(Your Own Private Search Engine )☆17Updated 3 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Updated 9 years ago
- CryptoTrojan in Python (For educational purpose ONLY)☆45Updated 6 years ago