ashutoshb47 / Spyware
It is a advanced keylogger.
☆50Updated 10 months ago
Alternatives and similar repositories for Spyware
Users that are interested in Spyware are comparing it to the libraries listed below
Sorting:
- A network scanner project. The idea was from cybercademy.org. [Still not complete, will work on during the summer break]☆52Updated last month
- Wi-Fi Deauthentication Tool is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as s…☆54Updated last year
- Wi-Fi Deauther is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as scanning, deau…☆37Updated last year
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆184Updated last year
- Basic tool for Information Gathering 🚀☆10Updated last year
- This is a project to perform a BRUTE FORCE attack on a self hosted website to better the understanding of the importance of cybersecurity…☆10Updated 10 months ago
- The Vulnerability Assessment project aims to identify and address security vulnerabilities in a Windows 10 virtual machine (VM). Using N…☆12Updated last year
- a simple keylogger in python that sends the keystrokes to the server (Telegram)☆15Updated 3 months ago
- Cybersecurity Internship Project☆91Updated 2 years ago
- ☆31Updated 6 years ago
- Hands-on ethical hacking projects for beginners, covering network scanning, web app testing, password cracking, honeypots, Wi-Fi auditing…☆291Updated 11 months ago
- 0xCipherLink ensures safe and encrypted file sharing using AES-256 encryption and PBKDF2 key derivation. With a user-friendly Tkinter int…☆11Updated 10 months ago
- This repository holds some very beginner projects that I worked on related to cybersecurity.☆14Updated 7 months ago
- A collection of python cybersecurity projects☆42Updated last year
- it content free resources including courses that help you to learn ethical hacking for beginners to advanced☆52Updated 2 years ago
- CEHv12 Notes☆15Updated last year
- this simple tool help you to detect Deauth_DoS Attack on your Machine☆18Updated 5 years ago
- Advance OTP Bypass Tool. Termux Supported.☆77Updated 2 months ago
- List of websites to practice and learn hacking legally☆88Updated 6 years ago
- Collection of Cyber Security Projects written in Python Script (executable on Linux terminal)☆68Updated 2 years ago
- Project for CyberSecurity Bachelor☆16Updated 3 years ago
- Bash For Ethical Hacking☆56Updated 2 years ago
- File System Integrity checker (etc)☆30Updated 7 years ago
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆12Updated 9 months ago
- Chat with anyone around the world using your own server and client☆27Updated last year
- This study guide have some [practical labs] to test your knowledge and learn by doing.☆68Updated 2 years ago
- Projects, notes, and write-ups I have done while completing the Google Cybersecurity Certificate☆103Updated last year
- "Essential Kali Linux commands for ethical hackers and penetration testers."☆92Updated last year
- Cyber Security projects. . .☆26Updated 2 years ago
- Welcome to the CEHv11 Study Material Repository! This repository contains a comprehensive collection of study materials for the Certified…☆47Updated 2 years ago