Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
☆2,725Apr 20, 2024Updated last year
Alternatives and similar repositories for Keylogger
Users that are interested in Keylogger are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Get All Registered Wifi Passwords from Target Computer.☆708Jan 30, 2024Updated 2 years ago
- Keylogger is 100% invisible keylogger not only for users, but also undetectable by antivirus software. keylogger Monitors all keystokes, …☆976Aug 20, 2025Updated 7 months ago
- Face Recognition Security☆186Jan 30, 2024Updated 2 years ago
- Send messages to any person in any time how much you want.☆508Mar 13, 2024Updated 2 years ago
- A python keylogger that does more than any other keylogger - Key logger, Clicks logger and Screenshots☆495Oct 14, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Introducing "URL Making Technology" to the world for the very FIRST TIME. Give a Mask to Phishing URL like a PRO.. A MUST have tool for P…☆3,069Sep 16, 2025Updated 6 months ago
- Generate Gmail Emailing Keyloggers to Windows.☆1,152Dec 2, 2022Updated 3 years ago
- Python Remote Administration Tool (RAT)☆3,573Jan 4, 2024Updated 2 years ago
- Machine Learning (Easy to Hard step by step)☆48Mar 11, 2020Updated 6 years ago
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.☆3,311Nov 1, 2025Updated 5 months ago
- Track any ip address with IP-Tracer. IP-Tracer is developed for Linux and Termux. you can retrieve any ip address information using IP-Tr…☆2,839Sep 21, 2024Updated last year
- 🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources☆1,534Jun 4, 2025Updated 10 months ago
- All in One Hacking Tool for Linux & Android (Termux). Make your linux environment into a Hacking Machine. Hackers are welcome in our blog☆1,784Jul 24, 2024Updated last year
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆2,334Jul 19, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- This Script will help you to gather information about your victim or friend.☆1,464Sep 10, 2025Updated 7 months ago
- SocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Belahsan Ouerghi Edit By samsesh for term…☆4,226Nov 14, 2025Updated 4 months ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,116Mar 17, 2024Updated 2 years ago
- Awesome hacking is an awesome collection of hacking tools.☆3,804Apr 2, 2026Updated last week
- A Stealthy Trojan Spyware☆1,175Oct 20, 2025Updated 5 months ago
- Tools for Pentesting☆2,138Nov 18, 2023Updated 2 years ago
- Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor a…☆1,181Oct 20, 2022Updated 3 years ago
- Hacking tools pack & backdoors generator.☆2,014Feb 19, 2025Updated last year
- DDos Ripper a Distributable Denied-of-Service (DDOS) attack server that cuts off targets or surrounding infrastructure in a flood of Inte…☆2,743Mar 10, 2026Updated last month
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- You guessed well, genius !! This tool is intended for the initiation to ethical hacking with python☆72Aug 11, 2019Updated 6 years ago
- Attack Surface Management Platform☆9,650Feb 15, 2026Updated last month
- ParadoxiaRat : Native Windows Remote access Tool.☆822Apr 18, 2023Updated 2 years ago
- Chrome Keylogger Extension | Post Exploitation Tool☆442Apr 26, 2022Updated 3 years ago
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆11May 19, 2020Updated 5 years ago
- This is a keylogger that collects all the data and e-mail it in a set time with system information which includes device S/N and hardware…☆46Oct 25, 2025Updated 5 months ago
- Collection of Python Scripts☆189Nov 12, 2024Updated last year
- 🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.☆2,632Sep 26, 2023Updated 2 years ago
- The all-in-one browser extension for offensive security professionals 🛠☆6,669Jan 5, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Grab cam shots & GPS location from target's phone front camera or PC webcam just sending a link.☆4,652Apr 29, 2025Updated 11 months ago
- Ransomwares Collection. Don't Run Them on Your Device.☆781May 27, 2025Updated 10 months ago
- Official Black Hat Arsenal Security Tools Repository☆4,253Aug 26, 2024Updated last year
- Android Keylogger + Reverse Shell☆467Apr 1, 2022Updated 4 years ago
- An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respect…☆3,460Mar 1, 2024Updated 2 years ago
- An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any mi…☆15,694Aug 21, 2024Updated last year
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,766Dec 9, 2025Updated 4 months ago