It is a advanced keylogger.
☆76Jul 2, 2024Updated last year
Alternatives and similar repositories for Spyware
Users that are interested in Spyware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A network scanner project. The idea was from cybercademy.org. [Still not complete, will work on during the summer break]☆73Jan 3, 2026Updated 2 months ago
- Wi-Fi Deauthentication Tool is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as s…☆95Nov 2, 2023Updated 2 years ago
- Wi-Fi Deauther is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as scanning, deau…☆57Nov 2, 2023Updated 2 years ago
- The Vulnerability Assessment project aims to identify and address security vulnerabilities in a Windows 10 virtual machine (VM). Using N…☆18Mar 4, 2024Updated 2 years ago
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆257Mar 21, 2024Updated 2 years ago
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆18Jul 29, 2024Updated last year
- a simple keylogger in python that sends the keystrokes to the server (Telegram)☆23Aug 18, 2025Updated 7 months ago
- A simple python based Key-Logger project in Cyber Security☆45Jan 30, 2025Updated last year
- This repository holds some very beginner projects that I worked on related to cybersecurity.☆23Sep 23, 2024Updated last year
- This is a project to perform a BRUTE FORCE attack on a self hosted website to better the understanding of the importance of cybersecurity…☆31Jul 6, 2024Updated last year
- ☆16Jan 21, 2025Updated last year
- An efficient spyware that is barely undetectable by antiviruses and get execute every time the computer start.☆22Apr 18, 2024Updated last year
- 0xCipherLink ensures safe and encrypted file sharing using AES-256 encryption and PBKDF2 key derivation. With a user-friendly Tkinter int…☆52Jul 1, 2024Updated last year
- Password Manager is a simple and secure application designed to store and manage your passwords. Developed using Java, it employs AES enc…☆56Sep 10, 2024Updated last year
- ☆39Oct 16, 2018Updated 7 years ago
- This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in …☆768Feb 3, 2026Updated last month
- Concurrency-optimized custom password cracker in python☆12Dec 14, 2015Updated 10 years ago
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆25Apr 25, 2021Updated 4 years ago
- A collection of useful, small python3 scripts for penetration testing/ethical hacking which I created over the years.☆10Aug 13, 2022Updated 3 years ago
- CyberSecurity Resources and Tools☆28Jun 24, 2024Updated last year
- Advanced android spyware☆24Nov 19, 2022Updated 3 years ago
- Who needs authentication? This cache purge vulnerability finder doesn't!☆10Apr 20, 2023Updated 2 years ago
- This is a resource factory for anyone looking forward to starting bug hunting and Ethical hacking would require guidance as a beginner.☆130Sep 22, 2022Updated 3 years ago
- A web-based application that is a voice-based email system for visually impaired people. It is used to detect and process users' voices.☆17Nov 3, 2021Updated 4 years ago
- This repository contains projects and activities that have been completed within the CyberSecurity Bootcamp.☆16May 24, 2022Updated 3 years ago
- A python trojan with spyware, info stealing and ransomware abilities.☆34Sep 12, 2025Updated 6 months ago
- Streamline testing with the power of Keploy, directly in your favorite IDE.☆21Apr 19, 2025Updated 11 months ago
- POC for netdata ndsudo vulnerability - CVE-2024-32019☆21Aug 3, 2025Updated 7 months ago
- Quantum zero-day exploit Hunting for vulnerabilities as small as a quantum particle☆13Jun 13, 2025Updated 9 months ago
- This package implements a complete SpyWare.☆151Nov 18, 2024Updated last year
- ☆13Sep 28, 2024Updated last year
- AI web vulneraribilty scanner 🤖☆20Feb 22, 2024Updated 2 years ago
- An subdomain enumerator for web URLs using the power of Goroutines.☆18Sep 3, 2023Updated 2 years ago
- CEH v13 exam resources & Tips☆38Jun 24, 2025Updated 8 months ago
- Bat Script to collect system and network information from Windows machines without external agents. Ideal for vulnerability assessment an…☆11Jan 27, 2025Updated last year
- POC for CVE-2023-24488☆14Jul 4, 2023Updated 2 years ago
- ☆16May 6, 2015Updated 10 years ago
- A script for the MPV media player that allows you to view PDF files☆13Nov 18, 2018Updated 7 years ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆18Aug 20, 2023Updated 2 years ago