Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
☆2,745Apr 20, 2024Updated 2 years ago
Alternatives and similar repositories for Keylogger
Users that are interested in Keylogger are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Get All Registered Wifi Passwords from Target Computer.☆720Jan 30, 2024Updated 2 years ago
- Keylogger is 100% invisible keylogger not only for users, but also undetectable by antivirus software. keylogger Monitors all keystokes, …☆981Aug 20, 2025Updated 9 months ago
- A simple keylogger for Windows, Linux and Mac☆2,386Aug 5, 2025Updated 9 months ago
- Face Recognition Security☆187Jan 30, 2024Updated 2 years ago
- Send messages to any person in any time how much you want.☆510Mar 13, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Introducing "URL Making Technology" to the world for the very FIRST TIME. Give a Mask to Phishing URL like a PRO.. A MUST have tool for P…☆3,109Sep 16, 2025Updated 8 months ago
- Generate Gmail Emailing Keyloggers to Windows.☆1,148Dec 2, 2022Updated 3 years ago
- Python Remote Administration Tool (RAT)☆3,601Jan 4, 2024Updated 2 years ago
- Machine Learning (Easy to Hard step by step)☆47Mar 11, 2020Updated 6 years ago
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.☆3,337Nov 1, 2025Updated 6 months ago
- Track any ip address with IP-Tracer. IP-Tracer is developed for Linux and Termux. you can retrieve any ip address information using IP-Tr…☆2,882Sep 21, 2024Updated last year
- 🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources☆1,540Jun 4, 2025Updated 11 months ago
- All in One Hacking Tool for Linux & Android (Termux). Make your linux environment into a Hacking Machine. Hackers are welcome in our blog☆1,810Jul 24, 2024Updated last year
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆2,349Jul 19, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This Script will help you to gather information about your victim or friend.☆1,490Sep 10, 2025Updated 8 months ago
- SocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Belahsan Ouerghi Edit By samsesh for term…☆4,305Nov 14, 2025Updated 6 months ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,222Mar 17, 2024Updated 2 years ago
- Awesome hacking is an awesome collection of hacking tools.☆3,832May 11, 2026Updated last week
- A Stealthy Trojan Spyware☆1,194Oct 20, 2025Updated 7 months ago
- Tools for Pentesting☆2,140Nov 18, 2023Updated 2 years ago
- Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor a…☆1,192Oct 20, 2022Updated 3 years ago
- Hacking tools pack & backdoors generator.☆2,033Feb 19, 2025Updated last year
- Attack Surface Management Platform☆10,016Apr 29, 2026Updated 3 weeks ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- DDos Ripper a Distributable Denied-of-Service (DDOS) attack server that cuts off targets or surrounding infrastructure in a flood of Inte…☆2,787Apr 25, 2026Updated 3 weeks ago
- You guessed well, genius !! This tool is intended for the initiation to ethical hacking with python☆72Aug 11, 2019Updated 6 years ago
- ParadoxiaRat : Native Windows Remote access Tool.☆823Apr 18, 2023Updated 3 years ago
- Chrome Keylogger Extension | Post Exploitation Tool☆445Apr 26, 2022Updated 4 years ago
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆11May 19, 2020Updated 6 years ago
- This is a keylogger that collects all the data and e-mail it in a set time with system information which includes device S/N and hardware…☆45Oct 25, 2025Updated 6 months ago
- Collection of Python Scripts☆188Nov 12, 2024Updated last year
- 🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.☆2,679Sep 26, 2023Updated 2 years ago
- The all-in-one browser extension for offensive security professionals 🛠☆6,717Jan 5, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Grab cam shots & GPS location from target's phone front camera or PC webcam just sending a link.☆4,744Apr 29, 2025Updated last year
- Ransomwares Collection. Don't Run Them on Your Device.☆809May 27, 2025Updated 11 months ago
- Official Black Hat Arsenal Security Tools Repository☆4,281Aug 26, 2024Updated last year
- An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respect…☆3,488Mar 1, 2024Updated 2 years ago
- Android Keylogger + Reverse Shell☆485Apr 1, 2022Updated 4 years ago
- An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any mi…☆15,974Aug 21, 2024Updated last year
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,773Dec 9, 2025Updated 5 months ago