htmercury / Cpp-Keylogger
Advanced keylogger made in C++ that works on Window 7, 8, 8.1, And 10 - Use at your own discretion
☆78Updated 7 years ago
Alternatives and similar repositories for Cpp-Keylogger:
Users that are interested in Cpp-Keylogger are comparing it to the libraries listed below
- Keylogger Code In C++ Will Work On Window 7, 8, 8.1, And 10☆79Updated 6 years ago
- ☆39Updated 7 years ago
- Simple C++ Keylogger...☆144Updated last year
- Python based Remote Administration Tool(RAT)☆91Updated 4 years ago
- Simple keylogger on C++ with several functions.☆17Updated 4 years ago
- Crypter made in C#. Nearly FUD. Detection rate 2/38☆51Updated 5 years ago
- Fully Undetectable Native C++ Remote Access Agent / Botnet.☆88Updated 5 years ago
- A Python program that scans RAM.☆39Updated 10 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆26Updated 8 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago
- njRAT C# Stub - Fixed For PowerShell☆54Updated 5 years ago
- Polymorph file protector☆44Updated 5 years ago
- some python3 functions to add spreading features to any python backdoor☆53Updated 8 years ago
- Ransomeware☆46Updated 7 years ago
- XOR encryption, malware crypter☆94Updated 11 years ago
- Source code of Claw Key logger previously sold on HackForums☆54Updated 2 years ago
- boilerplate python rat☆105Updated 4 years ago
- DarkCrypter encrypts your files and generates undetectable payloads to evade all anti-virus vendors.☆22Updated 2 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 7 years ago
- The Keylogger is able to capture all the keystrokes using system hooks. In addition to this, it is also able to put them into a file, enc…☆60Updated 6 years ago
- It is primary designed to be hidden and monitoring the computer activity. Take a screenshot of desktop in hidden mode using Visual C++ an…☆56Updated 4 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆97Updated 3 years ago
- Escalation / Bypass Windows UAC☆109Updated 5 years ago
- iSpy Keylogger☆42Updated 8 years ago
- Command-line Remote Access Tool (RAT)☆12Updated 4 years ago
- Panel for the HTTP botnet UBoat - https://github.com/UBoat-Botnet/UBoat/☆110Updated 3 years ago
- blackhole is a ransomware coded in c#☆27Updated 4 years ago
- HTTP botnet☆60Updated 8 years ago
- Command line Remote Access tool (RAT) targeting Windows Systems.☆14Updated 5 years ago
- Network worms capable of stealing files from and deleting sensitive information from remote system.☆19Updated 8 years ago