Spy your friends with this JavaScript homemade virus.
☆19Sep 9, 2022Updated 3 years ago
Alternatives and similar repositories for electron-keylogger
Users that are interested in electron-keylogger are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fully FUD keylogger that can bypass windows 11 & windows 10 defender protection and all kinds of Antivirus protections also.☆19Oct 9, 2021Updated 4 years ago
- SIP hacking tools and scripts☆23Nov 20, 2020Updated 5 years ago
- Modern Javascript keylogger with web panel☆22May 29, 2020Updated 5 years ago
- A simple low-interaction port monitoring honeypot.☆19Jun 14, 2020Updated 5 years ago
- ZigBee hacking tools and scripts☆14Mar 25, 2018Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Rust keylogger using winapi☆24Dec 25, 2015Updated 10 years ago
- Teensy code to brute force a keylogger's unlock code☆15Sep 5, 2016Updated 9 years ago
- Application features: Sets visibility of its own executeable file to hidden --> Adds itself to the registry of run-on-startup application…☆11Jan 30, 2019Updated 7 years ago
- migrate EvilCrow-Keylogger for platformio☆10May 9, 2023Updated 3 years ago
- System wide keylogger for Mac and Windows #openFrameworks☆13Sep 5, 2011Updated 14 years ago
- Apple wireless research and tools☆19Jul 19, 2020Updated 5 years ago
- All xxx-arsenal repos in one☆17Jan 28, 2019Updated 7 years ago
- Create an incident response triage toolkit for use with Windows or Linux.☆18Jun 14, 2020Updated 5 years ago
- 😈 Hardware USB keylogger project with Arduino.☆16Feb 2, 2017Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Simple filebased database☆21Mar 16, 2019Updated 7 years ago
- A chrome extension to mess with the webcam☆21Oct 27, 2018Updated 7 years ago
- keylogger sends the login details by email, card number, facebook account,paypal...etc new projet 2020☆17Sep 21, 2020Updated 5 years ago
- ☆20Jun 12, 2019Updated 6 years ago
- Decentralized messaging app built on LibP2P☆13May 4, 2021Updated 5 years ago
- White-hat hacking keylogger☆18Apr 9, 2015Updated 11 years ago
- Defund the Police.☆19Jun 14, 2020Updated 5 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Jan 12, 2017Updated 9 years ago
- Original hVNC has been recoded to work with all version of windows above XP. Thanks to the original author for this wonderful tool.☆10Oct 13, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- persistent windows 10 and 11 keylogger☆22Mar 16, 2023Updated 3 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 4 years ago
- Run shellcode via EnumDesktopsA. C++ implementation☆13Jun 27, 2022Updated 3 years ago
- A side channel attack on the acoustic signal of the typing sounds in order to get the typed data and produce smart dictionary attacks on …☆22Mar 13, 2019Updated 7 years ago
- ☆11Apr 23, 2019Updated 7 years ago
- Huawei login page extracted from real device and modified for #Evil-twin attack☆20May 8, 2022Updated 4 years ago
- Pythonic interface to the Internet Storm Center / DShield API.☆28May 23, 2023Updated 2 years ago
- Example of malicious codes for educational purpose, don't make shit with that☆28Feb 15, 2019Updated 7 years ago
- Loading unmanaged dll (32 and 64bits) in managed exe☆10Dec 12, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Create Evil Twin network that deauthernticates victims to force them to connect to your evil AP.☆27May 21, 2021Updated 4 years ago
- Rust procedural macro to insert a few asm! calls full of junk instructions in between every line of code.☆12May 27, 2023Updated 2 years ago
- This is a small framework for generate and listen to Keylogger malwares... And also the most effective and most useful feature about this…☆19Apr 15, 2020Updated 6 years ago
- Simple netcat wrote in C☆15Jun 25, 2025Updated 10 months ago
- Mis proyectos de marketing aplicando AI☆10Oct 31, 2025Updated 6 months ago
- Keep track of a GSM device and show its location on a map☆10Apr 14, 2016Updated 10 years ago
- Dart project that allows you to control the mouse and keyboard to automate interactions with other applications.☆11Nov 28, 2023Updated 2 years ago