TheBugFather / Advanced-KeyloggerLinks
Gathers network information, then simultaniously logs keys, takes screenshots, takes webcam pictures, and records mic.
☆25Updated 2 years ago
Alternatives and similar repositories for Advanced-Keylogger
Users that are interested in Advanced-Keylogger are comparing it to the libraries listed below
Sorting:
- Undetectable Keylogger that reports to Discord☆74Updated last year
- Big-Papa is a remote cookie stealer which can then be used for session hijacking and Bypassing 2 Factor Authentication☆104Updated 3 years ago
- ⛤Keylogger Generator for Windows written in Python⛤☆54Updated 2 years ago
- Spoof Calls For Free - Unlimited Usage☆112Updated 3 years ago
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆188Updated 3 months ago
- A versatile command and control center (CCC) for DDoS Botnet Simulation & Load Generation.☆125Updated last year
- Information Gathering Simplified.☆70Updated 2 years ago
- Advanced phishing tool used for session & credential grabbing and bypassing 2FA using man-in-the-middle attack with standalone reverse p…☆89Updated 2 years ago
- (Beta) RES0LUTI0N is a malware builder undetected by Windows Defender with an anti-VM coded in python and C#. It uses a triple layer rand…☆53Updated last year
- Jarbou3 is rat tool coded in python with C&C which can accept multiple connections from clients☆27Updated last year
- Remote Administration tool for Windows Systems written in pure Python☆131Updated last year
- OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once install…☆163Updated 2 months ago
- Python Tutorial - || Advanced Keylogger || Code Walk-through || Hacking/Info-Sec ||☆88Updated 7 months ago
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆263Updated 4 years ago
- Create a fully undetectable backdoor with simple steps.☆75Updated 3 years ago
- Exploit toolkit☆59Updated 4 years ago
- Phising 2FA Gmail☆101Updated 3 years ago
- Argus Advanced Remote & Local Keylogger For macOS and Windows☆134Updated last year
- Chrome Credential Stealer that reports to Discord through Webhooks☆40Updated 3 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆63Updated 4 years ago
- Google account phishing tool written in python using django☆102Updated 2 months ago
- Simple Penetration Testing Multitool For Beginners.☆60Updated 2 years ago
- A framework like a metasploit containg a variety of modules for pentesting or ethical hacking. This repo willl be updated and new modules…☆144Updated 2 months ago
- The purpose of this tool is to automate the payload Creation Process. U can Create Payloads For All Types of OS in Seconds.☆53Updated last year
- Dogma V1.5.3☆31Updated 5 years ago
- Python 3.x based email spoofer☆245Updated last year
- A reverse TCP payload and listener both written in python3.☆31Updated last year
- Simple script masks the phishing link under the normal URL☆84Updated 4 years ago
- New Redline Leak☆127Updated 4 years ago
- A windows post exploitation tool that contains a lot of features for information gathering and more.☆47Updated 4 years ago