Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
☆2,734Apr 20, 2024Updated 2 years ago
Alternatives and similar repositories for Keylogger
Users that are interested in Keylogger are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Get All Registered Wifi Passwords from Target Computer.☆708Jan 30, 2024Updated 2 years ago
- Keylogger is 100% invisible keylogger not only for users, but also undetectable by antivirus software. keylogger Monitors all keystokes, …☆979Aug 20, 2025Updated 8 months ago
- A simple keylogger for Windows, Linux and Mac☆2,378Aug 5, 2025Updated 8 months ago
- Face Recognition Security☆187Jan 30, 2024Updated 2 years ago
- Send messages to any person in any time how much you want.☆510Mar 13, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A python keylogger that does more than any other keylogger - Key logger, Clicks logger and Screenshots☆498Oct 14, 2024Updated last year
- Introducing "URL Making Technology" to the world for the very FIRST TIME. Give a Mask to Phishing URL like a PRO.. A MUST have tool for P…☆3,087Sep 16, 2025Updated 7 months ago
- Generate Gmail Emailing Keyloggers to Windows.☆1,148Dec 2, 2022Updated 3 years ago
- Python Remote Administration Tool (RAT)☆3,594Jan 4, 2024Updated 2 years ago
- Machine Learning (Easy to Hard step by step)☆48Mar 11, 2020Updated 6 years ago
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.☆3,323Nov 1, 2025Updated 6 months ago
- Track any ip address with IP-Tracer. IP-Tracer is developed for Linux and Termux. you can retrieve any ip address information using IP-Tr…☆2,859Sep 21, 2024Updated last year
- 🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources☆1,535Jun 4, 2025Updated 10 months ago
- All in One Hacking Tool for Linux & Android (Termux). Make your linux environment into a Hacking Machine. Hackers are welcome in our blog☆1,795Jul 24, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆2,339Jul 19, 2024Updated last year
- This Script will help you to gather information about your victim or friend.☆1,480Sep 10, 2025Updated 7 months ago
- SocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Belahsan Ouerghi Edit By samsesh for term…☆4,273Nov 14, 2025Updated 5 months ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,172Mar 17, 2024Updated 2 years ago
- Awesome hacking is an awesome collection of hacking tools.☆3,819Apr 2, 2026Updated 3 weeks ago
- A Stealthy Trojan Spyware☆1,187Oct 20, 2025Updated 6 months ago
- Tools for Pentesting☆2,139Nov 18, 2023Updated 2 years ago
- Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor a…☆1,187Oct 20, 2022Updated 3 years ago
- Hacking tools pack & backdoors generator.☆2,026Feb 19, 2025Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Attack Surface Management Platform☆9,715Feb 15, 2026Updated 2 months ago
- You guessed well, genius !! This tool is intended for the initiation to ethical hacking with python☆72Aug 11, 2019Updated 6 years ago
- DDos Ripper a Distributable Denied-of-Service (DDOS) attack server that cuts off targets or surrounding infrastructure in a flood of Inte…☆2,769Apr 15, 2026Updated 2 weeks ago
- ParadoxiaRat : Native Windows Remote access Tool.☆821Apr 18, 2023Updated 3 years ago
- Chrome Keylogger Extension | Post Exploitation Tool☆442Apr 26, 2022Updated 4 years ago
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆11May 19, 2020Updated 5 years ago
- This is a keylogger that collects all the data and e-mail it in a set time with system information which includes device S/N and hardware…☆45Oct 25, 2025Updated 6 months ago
- Collection of Python Scripts☆187Nov 12, 2024Updated last year
- 🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.☆2,656Sep 26, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- The all-in-one browser extension for offensive security professionals 🛠☆6,698Jan 5, 2025Updated last year
- Grab cam shots & GPS location from target's phone front camera or PC webcam just sending a link.☆4,700Apr 29, 2025Updated last year
- Ransomwares Collection. Don't Run Them on Your Device.☆794May 27, 2025Updated 11 months ago
- Official Black Hat Arsenal Security Tools Repository☆4,272Aug 26, 2024Updated last year
- An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respect…☆3,473Mar 1, 2024Updated 2 years ago
- Android Keylogger + Reverse Shell☆478Apr 1, 2022Updated 4 years ago
- An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any mi…☆15,817Aug 21, 2024Updated last year