This is an advanced keylogger which sends keylog reports every 30 minutes to the specified email on the config file.
☆21Aug 19, 2021Updated 4 years ago
Alternatives and similar repositories for advanced-keylogger
Users that are interested in advanced-keylogger are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Android keylogger☆10May 12, 2020Updated 5 years ago
- Python Key logger that runs in the background and captures key strokes, then emails them to any specified gmail address after a set inter…☆16Aug 10, 2020Updated 5 years ago
- A powerful keylogger records all keystrokes including some special keys and send them to gmail.☆13Feb 24, 2022Updated 4 years ago
- Log keystrokes, take screenshots and grab system information from a target host and exfiltrate to Discord and Google Forms.☆20Jul 25, 2023Updated 2 years ago
- Hack any Instagram account through bruteforce.☆11Sep 24, 2021Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Remote persistent keylogger for Windows and Linux..☆12Aug 21, 2022Updated 3 years ago
- This is a combination of a hacking and a cracking tool.☆35May 2, 2021Updated 4 years ago
- ☆18Dec 6, 2022Updated 3 years ago
- Hello everyone Ladies and gentlemen, we present to your attention the android botnet "POISON" Works on 8-12 android Functionality: 1. Sen…☆10Jul 15, 2022Updated 3 years ago
- Inspecting the Moto Audio application running on Motorola Android devices☆10Aug 28, 2021Updated 4 years ago
- python keylogger and spying malware .☆15Apr 24, 2025Updated 11 months ago
- ⌨️ A simple python code that you can use to make an effective keylogger.☆11Nov 7, 2020Updated 5 years ago
- ☆19Apr 3, 2017Updated 9 years ago
- Brute List is an updated word list for brute-forcing the assets. This is not like a normal outdated word list. I have collected several l…☆32Aug 29, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Listed below are some extra phishing scenarios for wifiphisher these scenarios are only added to provide security awareness. It may not b…☆15Jul 3, 2017Updated 8 years ago
- ⌨️ A keylogger is nothing more than a memorizer of actions produced on the keyboard: its translation from English is in fact “keylogger”.☆10Oct 24, 2022Updated 3 years ago
- Keylogger using FTP server as an intermediate with some cool additional functions☆22Apr 15, 2017Updated 8 years ago
- Advanced Keylogger in Python with screenshot, microphone, webcam pictures taking capabilities and also Collects Network/Wifi Info, System…☆145Apr 5, 2022Updated 4 years ago
- This repository contains the python code of the keylogger which will get all the key hits by the user as well get the content from clipbo…☆12Feb 17, 2023Updated 3 years ago
- This Python code will quickly find duplicates or similarities in sets of data.☆10Feb 6, 2018Updated 8 years ago
- LinkedIn Auto Connect Tool☆12Jan 3, 2021Updated 5 years ago
- Simple but sharp ransomware☆35Jul 11, 2020Updated 5 years ago
- ☆10Oct 8, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Telegram Group Scraper Tool. Fetch All Information About Group Members☆18Jan 23, 2022Updated 4 years ago
- Expired FUD .exe crypter☆12Aug 21, 2016Updated 9 years ago
- ☆11May 30, 2021Updated 4 years ago
- Python PoC for CVE-2020-35846 targeting Cockpit 0.11.1☆15Jul 25, 2021Updated 4 years ago
- ⌨ A keyLogger that sends logs by email, FTP, and ICMP (ping)☆15Jan 21, 2020Updated 6 years ago
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Aug 2, 2020Updated 5 years ago
- Detects malware trying to send logs to a email☆16Feb 24, 2023Updated 3 years ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability.☆11Nov 26, 2022Updated 3 years ago
- Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research☆13Jan 19, 2024Updated 2 years ago
- Octoprint for the Orange Pi Zero☆12Apr 22, 2018Updated 7 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Feb 26, 2026Updated last month
- The website allows users to turn their Bluetooth earbuds or AirPods into spy microphones. By connecting their earbuds to their smartphone…☆13Nov 10, 2024Updated last year
- ToyOS is a simple x86 OS that only accepts numeric values into the input stream and returns them to a standard out console.☆12Nov 27, 2025Updated 4 months ago
- ATM security list☆13Aug 10, 2020Updated 5 years ago