It is a advanced keylogger.
☆77Jul 2, 2024Updated last year
Alternatives and similar repositories for Spyware
Users that are interested in Spyware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A network scanner project. The idea was from cybercademy.org. [Still not complete, will work on during the summer break]☆75Jan 3, 2026Updated 3 months ago
- Wi-Fi Deauthentication Tool is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as s…☆96Nov 2, 2023Updated 2 years ago
- Wi-Fi Deauther is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as scanning, deau…☆57Nov 2, 2023Updated 2 years ago
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆262Mar 21, 2024Updated 2 years ago
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆18Jul 29, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Basic tool for Information Gathering 🚀☆24Mar 26, 2024Updated 2 years ago
- This is a project to perform a BRUTE FORCE attack on a self hosted website to better the understanding of the importance of cybersecurity…☆32Jul 6, 2024Updated last year
- ☆16Jan 21, 2025Updated last year
- An efficient spyware that is barely undetectable by antiviruses and get execute every time the computer start.☆22Apr 18, 2024Updated last year
- 0xCipherLink ensures safe and encrypted file sharing using AES-256 encryption and PBKDF2 key derivation. With a user-friendly Tkinter int…☆54Jul 1, 2024Updated last year
- Password Manager is a simple and secure application designed to store and manage your passwords. Developed using Java, it employs AES enc…☆55Sep 10, 2024Updated last year
- ☆40Oct 16, 2018Updated 7 years ago
- This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in …☆798Feb 3, 2026Updated 2 months ago
- Concurrency-optimized custom password cracker in python☆12Dec 14, 2015Updated 10 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Fairly Undetectable Linux Spyware☆18Mar 1, 2023Updated 3 years ago
- Keylogger for ethical hackers☆14Aug 25, 2021Updated 4 years ago
- A collection of useful, small python3 scripts for penetration testing/ethical hacking which I created over the years.☆10Aug 13, 2022Updated 3 years ago
- CyberSecurity Resources and Tools☆30Jun 24, 2024Updated last year
- Advanced android spyware☆24Nov 19, 2022Updated 3 years ago
- This project contains programs that will create a database of the programs installed on your PC, and match them against the NIST's CPEs (…☆25Apr 14, 2021Updated 4 years ago
- This repo contains only quality verified training material/courses/labs that helps you establish and advance cyber career☆28Mar 25, 2024Updated 2 years ago
- Who needs authentication? This cache purge vulnerability finder doesn't!☆10Apr 20, 2023Updated 2 years ago
- Collection of Cyber Security Projects written in Python Script (executable on Linux terminal)☆131May 17, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- This is a resource factory for anyone looking forward to starting bug hunting and Ethical hacking would require guidance as a beginner.☆130Sep 22, 2022Updated 3 years ago
- This repository contains projects and activities that have been completed within the CyberSecurity Bootcamp.☆16May 24, 2022Updated 3 years ago
- A python trojan with spyware, info stealing and ransomware abilities.☆34Sep 12, 2025Updated 7 months ago
- Assalamualaikum, new update DH Bomber tools. Enjoy guys 🥀💞☆10May 5, 2025Updated 11 months ago
- Streamline testing with the power of Keploy, directly in your favorite IDE.☆21Apr 19, 2025Updated 11 months ago
- Project for CyberSecurity Bachelor☆16Mar 9, 2022Updated 4 years ago
- Quantum zero-day exploit Hunting for vulnerabilities as small as a quantum particle☆13Jun 13, 2025Updated 10 months ago
- This package implements a complete SpyWare.☆153Nov 18, 2024Updated last year
- AI web vulneraribilty scanner 🤖☆20Feb 22, 2024Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- The "Let's-defend-solution" directory contains the answers to all paths of the Let's Defend platform that were saved by the creator 8 mon…☆12Apr 27, 2023Updated 2 years ago
- An Android RAT that collects various sensitive information in real-time and send them to the attacker databse.☆43Nov 22, 2019Updated 6 years ago
- CEH v13 exam resources & Tips☆38Jun 24, 2025Updated 9 months ago
- Personal pentest notes and playbooks<3☆33Jan 7, 2026Updated 3 months ago
- POC for CVE-2023-24488☆14Jul 4, 2023Updated 2 years ago
- ☆16May 6, 2015Updated 10 years ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆18Aug 20, 2023Updated 2 years ago