It is a advanced keylogger.
☆77Jul 2, 2024Updated last year
Alternatives and similar repositories for Spyware
Users that are interested in Spyware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A network scanner project. The idea was from cybercademy.org. [Still not complete, will work on during the summer break]☆76Jan 3, 2026Updated 4 months ago
- Wi-Fi Deauthentication Tool is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as s…☆96Nov 2, 2023Updated 2 years ago
- Wi-Fi Deauther is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as scanning, deau…☆56Nov 2, 2023Updated 2 years ago
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆264Mar 21, 2024Updated 2 years ago
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆19Jul 29, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A simple python based Key-Logger project in Cyber Security☆46Jan 30, 2025Updated last year
- This is a project to perform a BRUTE FORCE attack on a self hosted website to better the understanding of the importance of cybersecurity…☆32Jul 6, 2024Updated last year
- ☆15Jan 21, 2025Updated last year
- An efficient spyware that is barely undetectable by antiviruses and get execute every time the computer start.☆22Apr 18, 2024Updated 2 years ago
- Password Manager is a simple and secure application designed to store and manage your passwords. Developed using Java, it employs AES enc…☆57Sep 10, 2024Updated last year
- ☆40Oct 16, 2018Updated 7 years ago
- This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in …☆818Apr 16, 2026Updated last month
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆25Apr 25, 2021Updated 5 years ago
- Keylogger for ethical hackers☆14Aug 25, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- CyberSecurity Resources and Tools☆30Jun 24, 2024Updated last year
- This project contains programs that will create a database of the programs installed on your PC, and match them against the NIST's CPEs (…☆25Apr 14, 2021Updated 5 years ago
- Advanced Splunk 8, published by Packt☆11Dec 15, 2025Updated 5 months ago
- Who needs authentication? This cache purge vulnerability finder doesn't!☆10Apr 20, 2023Updated 3 years ago
- Collection of Cyber Security Projects written in Python Script (executable on Linux terminal)☆138May 17, 2022Updated 4 years ago
- This is a resource factory for anyone looking forward to starting bug hunting and Ethical hacking would require guidance as a beginner.☆132Sep 22, 2022Updated 3 years ago
- A python trojan with spyware, info stealing and ransomware abilities.☆34Sep 12, 2025Updated 8 months ago
- Assalamualaikum, new update DH Bomber tools. Enjoy guys 🥀💞☆11May 5, 2025Updated last year
- All Exploit List Made By Me☆17Apr 7, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Quantum zero-day exploit Hunting for vulnerabilities as small as a quantum particle☆13Jun 13, 2025Updated 11 months ago
- POC for netdata ndsudo vulnerability - CVE-2024-32019☆21Aug 3, 2025Updated 9 months ago
- This package implements a complete SpyWare.☆157Nov 18, 2024Updated last year
- This lab is for **EDUCATIONAL PURPOSES ONLY**. Use it responsibly and only on systems you own or have explicit permission to test. Do not…☆20Feb 20, 2026Updated 3 months ago
- ☆14Sep 28, 2024Updated last year
- The "Let's-defend-solution" directory contains the answers to all paths of the Let's Defend platform that were saved by the creator 8 mon…