Keylogger em Python
☆48Jul 10, 2023Updated 2 years ago
Alternatives and similar repositories for keylogger
Users that are interested in keylogger are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆11May 19, 2020Updated 5 years ago
- Guia Acker Code de Programação e Hacking☆394Jul 12, 2025Updated 8 months ago
- Pentest tool com foco em teste de intrusão em redes wireless para Windows☆12Dec 24, 2019Updated 6 years ago
- A collection of useful Python hacking scripts for beginners.☆17Apr 20, 2021Updated 4 years ago
- Writeups on my TryHackMe adventures!☆58Oct 5, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Fake-sms☆27Jun 21, 2025Updated 9 months ago
- KeyloggerScreenshot is an intelligent tool which logs keys, makes a Screenshot every 20 seconds, recordes the mouse click with x and y po…☆139Oct 28, 2025Updated 5 months ago
- Bug Hunting Penetration RGB Hat are red, gray, and black hat☆19Jan 21, 2026Updated 2 months ago
- Personal version of tools from Black Hat Python☆41Dec 23, 2021Updated 4 years ago
- Scripts Python for hacking☆14Dec 24, 2024Updated last year
- xorhunx adalah tool cryptography☆11Jun 21, 2023Updated 2 years ago
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆257Mar 21, 2024Updated 2 years ago
- Information Gathering Simplified.☆83Jan 17, 2023Updated 3 years ago
- Python script to automatically steal all the files and information from a computer using an USB device. Created just for educational purp…☆64Jan 10, 2026Updated 2 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Simple Penetration Testing Multitool For Beginners.☆60Dec 8, 2022Updated 3 years ago
- Evil Eye is a tool of python based program for simple audio steganography.☆61Aug 26, 2022Updated 3 years ago
- 🏆 Projeto realizado no primeiro semestre da faculdade de tecnologia @BandTec, aplicando todo conhecimento aprendido☆12Oct 19, 2023Updated 2 years ago
- Search Termux Commands and Guide in Termux !!☆12Apr 29, 2022Updated 3 years ago
- Simple Ransoware to attack Windows 🌟☆25Apr 19, 2023Updated 2 years ago
- USB testing framework☆14May 22, 2023Updated 2 years ago
- An Excellent OSINT tool to get information of any ip address. All details are explained in below screenshot☆286Nov 13, 2024Updated last year
- Odds and Ends, Node that helped myself along the way☆14May 12, 2020Updated 5 years ago
- a tool that functions to find subdomains of a website with the scanning method☆31Apr 16, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- DarkCool All Tools For Hacking Activity! List:~ Exploiter, Checker, Webshell Finder, Grabber, Searching, Bruteforce, Random, And Others T…☆177Feb 29, 2024Updated 2 years ago
- Simple Web IDE made for Pythonista☆10Feb 15, 2016Updated 10 years ago
- Ernie-AI-Windows is an innovative artificial intelligence software tailored specifically for Windows operating systems, delivering cuttin…☆55Apr 5, 2024Updated last year
- Opensource Telegram (Osint) Tool☆20Jan 3, 2025Updated last year
- GeeekPi UPS restore on power loss feature fix with 555 timer.☆10Dec 16, 2020Updated 5 years ago
- tools, hacks and stuff for iOS (this is old stuff based on an old iOS version and wasn't tested for functioning on recent iOS devices)☆13Jan 11, 2016Updated 10 years ago
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Jun 28, 2018Updated 7 years ago
- Covering fundamental Linux concepts, from basic commands to advanced topics like string processing, file management, user and group manag…☆17Apr 18, 2025Updated 11 months ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Um guia abrangente para iniciantes na área de cibersegurança.☆363Oct 19, 2023Updated 2 years ago
- A powerful tool for remotely controlling your PC via a Telegram bot, offering features like file management, system control, hardware int…☆12Jul 12, 2025Updated 8 months ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 11 years ago
- PST Parser using pypff - Export all email headers and body to csv or json☆10Nov 8, 2019Updated 6 years ago
- ☆14Oct 23, 2021Updated 4 years ago
- Learn how to build a socially responsible portfolio☆11May 26, 2019Updated 6 years ago
- AWS Key Management Service (KMS) makes it easy for you to create and manage cryptographic keys and control their use across a wide range …☆16Jan 26, 2026Updated 2 months ago