👨🏻💻 A great tool for Ethical Hackers, a malware programmed with Backdoor and Keylogger.
☆45Nov 5, 2020Updated 5 years ago
Alternatives and similar repositories for Malware-with-Backdoor-and-Keylogger
Users that are interested in Malware-with-Backdoor-and-Keylogger are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Modern Javascript keylogger with web panel☆23May 29, 2020Updated 5 years ago
- ☆13Jul 11, 2024Updated last year
- White-hat hacking keylogger☆18Apr 9, 2015Updated 10 years ago
- Repository for the Udemy Course: "Build an Advanced Keylogger using C++ for Ethical Hacking!" with instructor Ermin Kreponic☆12Feb 1, 2018Updated 8 years ago
- Python tools for ethical hacking☆45Jul 14, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- VPN seed4me Account Generator 1 Years☆11Jan 1, 2026Updated 2 months ago
- Plog - A simple and powerful keylogger !☆11Jun 28, 2018Updated 7 years ago
- Detect the possible hash-types corresponding to a string, right from your terminal.☆11Jan 5, 2023Updated 3 years ago
- A Node.js module to detect temporary email addresses☆11May 20, 2023Updated 2 years ago
- Sysprep Volatile Environment LPE (2017)☆16Jun 28, 2025Updated 9 months ago
- Android Hacking Framework to generate apk with backdoor, Works on both WAN and LAN☆19Jun 19, 2022Updated 3 years ago
- I will upload challenges I create for various ctf's or educational purposes here.☆24Apr 3, 2022Updated 3 years ago
- Keylogger for ethical hackers☆14Aug 25, 2021Updated 4 years ago
- 📱 Detect the user mobile phone (Android or iOS) based on their device's OS☆11Nov 25, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Simple CRUD Android Studio using GetJSON, AsyncTask, Database MySQL with API php☆10Feb 8, 2018Updated 8 years ago
- OSINT phone number check tool (Indonesia)☆17Sep 6, 2025Updated 6 months ago
- This will compile a list of Android, iOS, Linux malware techniques for attacking and detection purposes.☆27Nov 29, 2022Updated 3 years ago
- Collect and filter location information from social network services.☆11Jun 14, 2020Updated 5 years ago
- Get/dump chrome and firefox saved passwords.☆20Sep 13, 2020Updated 5 years ago
- Simple keylogger on C++ with several functions.☆16Jun 19, 2020Updated 5 years ago
- Detect websites protected by paywall applications☆17Jan 15, 2019Updated 7 years ago
- Automated Information Retrieval From APKs For Initial Analysis☆33Oct 2, 2017Updated 8 years ago
- Python'un scapy modülü kullanılarak aynı ağda bulunan cihazların ip ve mac adreslerini listeyen script.☆11Jun 24, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆10Oct 18, 2024Updated last year
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆25Sep 2, 2020Updated 5 years ago
- A small, unfinished utility to browse and download NirSoft programs.☆17Jun 14, 2020Updated 5 years ago
- This is a Simple reg Backdoor for Windows shell Hacking. You can fully compromise the target machine with this TOOL . For Advance backdoo…☆16Oct 26, 2020Updated 5 years ago
- CLI generator for Velociraptor offline collector☆16Mar 6, 2026Updated 3 weeks ago
- This is a stealthier version of Keylogger-lkm, it introduces hiding techniques and also a command entering option.☆13Jan 27, 2023Updated 3 years ago
- Retrieve an array of possible hash types corresponding to a given string.☆17Jan 5, 2023Updated 3 years ago
- DDRS4PALS - A software for the acquisition and simulation of positron lifetime spectra (PALS) using the DRS4 evaluation board.☆12Aug 29, 2022Updated 3 years ago
- CTF challenge solutions and writeups☆11Mar 2, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Create Evil Twin network that deauthernticates victims to force them to connect to your evil AP.☆27May 21, 2021Updated 4 years ago
- PoC for CVE-2021-3129 (Laravel)☆12Oct 9, 2021Updated 4 years ago
- ZigBee hacking tools and scripts☆14Mar 25, 2018Updated 8 years ago
- This is a small framework for generate and listen to Keylogger malwares... And also the most effective and most useful feature about this…☆19Apr 15, 2020Updated 5 years ago
- Smart Content Management System using Spring Boot☆17Mar 18, 2026Updated last week
- Teensy code to brute force a keylogger's unlock code☆15Sep 5, 2016Updated 9 years ago
- Kaumodaki is a tool which has collection of all the popular hacking tools at one place.☆25May 17, 2020Updated 5 years ago