SherazIbrahim / KeyLogger
I created my own Keylogger I am going to open source its code .But no one is allowed to use it commercially and I have actual copy rights .So it is for non-commercial use and you only can use it for legal or illegal but good purposes .Thanks!
☆12Updated 7 years ago
Alternatives and similar repositories for KeyLogger:
Users that are interested in KeyLogger are comparing it to the libraries listed below
- A simple Android Remote Administration Tool written for https://0x00sec.org!☆35Updated 8 years ago
- This is a plugin for the c# R.A.T server providing extension to android based phone systems☆22Updated 7 years ago
- A simple site cloner☆25Updated 7 years ago
- iSpy Keylogger☆42Updated 8 years ago
- Easy & Advanced Websites Admin Panel URL Finder Python Script.☆11Updated 4 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago
- Foxss is a simple php based penetration Testing Tool.Currently it will help to find XSS vulnerability in websites.☆36Updated 6 years ago
- Hacking tools resources☆33Updated 11 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆26Updated 7 years ago
- facebook bot ,like comment,download phone number, download email adress, delect all friends ...........etc☆20Updated 5 years ago
- This is a R.A.T Client for android phones☆28Updated 7 years ago
- ransomware encrypte all filles,disque C,disque D,Usb ...etc, filles can not be decrypted☆17Updated 6 years ago
- Dump WiFi passwords on Windows 10☆20Updated 7 years ago
- pure python remote adb scanner + nmap scan module☆21Updated 6 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 7 years ago
- CryptoTrojan in Python (For educational purpose ONLY)☆48Updated 7 years ago
- Keep It Secure Private Data Encryption & Decryption Tool☆45Updated 7 years ago
- An advance keylogger that works and also logs special keys.☆19Updated 2 years ago
- This is not a real botnet, this is suppose to show how botnets work, no virus, just simple python code.☆16Updated 7 years ago
- ☆9Updated 8 years ago
- ⛔🛡️ WeDefend - Monitor and Protect Windows from Remote Access Trojan☆25Updated 6 years ago
- Simple Remote Access Trojan☆21Updated 8 years ago
- Collection of cracked malware☆14Updated 6 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆21Updated 3 months ago
- Experimental examples of Ransomware in different languages☆37Updated 7 years ago
- ransomware chiffre tous les fichiers,télécharge une image depuis un serveur distant puis change le fond d'ecran après le chiffrement des …☆25Updated 4 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Updated 5 years ago
- This module captures SQL traffic using MITM techinques, and replace a given statement with a new one.☆12Updated 6 years ago
- Archive of leaked Equation Group materials☆15Updated 8 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆50Updated 8 years ago