A Keylogger Made in Python. Tested on Windows, Linux. windows and linux executable payload generator. Screen shot and custom time delay. mail based control.
☆16Sep 18, 2022Updated 3 years ago
Alternatives and similar repositories for Adrishya-Keylogger
Users that are interested in Adrishya-Keylogger are comparing it to the libraries listed below
Sorting:
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆16Mar 13, 2022Updated 3 years ago
- damn-exploitable-android-app-apk☆40Jun 9, 2023Updated 2 years ago
- ☆11Sep 15, 2024Updated last year
- Diversos projetos voltados à Segurança Cibernética☆12Nov 17, 2021Updated 4 years ago
- Script Deface Keren Dan Berkelas☆10Jun 26, 2022Updated 3 years ago
- ☆18May 11, 2021Updated 4 years ago
- MCP Server for Cutter☆21Aug 2, 2025Updated 7 months ago
- Cipher Suite Checker☆12Mar 22, 2023Updated 2 years ago
- ☆10Mar 11, 2024Updated last year
- This repo contains the material pertaining to the Computer Programming course I teach at LAU☆50May 3, 2023Updated 2 years ago
- Information about Progress MoveIT CVE☆11Jun 16, 2023Updated 2 years ago
- Template to detect some malware☆14Aug 7, 2023Updated 2 years ago
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 5 years ago
- My Linux dotfiles☆13Sep 16, 2022Updated 3 years ago
- Keylogger builder written in C#☆11Jul 13, 2022Updated 3 years ago
- terminal customization☆10Dec 17, 2022Updated 3 years ago
- A tetris game coded in python.☆16Jul 31, 2022Updated 3 years ago
- OpenSSH Vulnerabilities Scanner: Bulk Scanning Tool for 21 different OpenSSH CVEs.☆10Apr 29, 2025Updated 10 months ago
- ☆12Sep 3, 2024Updated last year
- Scanner for Log4j RCE CVE-2021-44228☆11Jul 6, 2022Updated 3 years ago
- A list of resources for those interested in getting started in bug bounties☆10Oct 28, 2022Updated 3 years ago
- JUST FOR FUN☆10Feb 13, 2023Updated 3 years ago
- A poem generator based on text generation using GRU☆10Jan 14, 2021Updated 5 years ago
- ☆10Feb 17, 2023Updated 3 years ago
- WordPress Checklist☆12Jun 5, 2019Updated 6 years ago
- Android BugBazaar: Your mobile appsec playground to Explore, Exploit, Excel☆68Aug 14, 2024Updated last year
- A JS BASED PROFILE GUESSER☆10Feb 11, 2023Updated 3 years ago
- Unveiling Cyber Threats: From assets to Vulnerability Insights☆17Oct 22, 2024Updated last year
- This is a satellite hack prank tool to show off and prank your friends like a real hacker☆15Oct 16, 2025Updated 4 months ago
- This python based tool can be used to discover API keys, access tokens, and other sensitive data in JavaScript files. It can scan JavaScr…☆15Oct 18, 2024Updated last year
- Google dorks for SQL injection, Local File Inclusion, open CCTV cams and sensitive information.☆14Jul 6, 2018Updated 7 years ago
- Python script to execute commands via Erlang/OTP Distribution Protocol☆15Feb 6, 2024Updated 2 years ago
- CEH Practical Preparation☆11Oct 2, 2022Updated 3 years ago
- All Items Related to bug bounty☆13Aug 8, 2025Updated 7 months ago
- Common Errors,self-written scripts related to information security,CTF challenges,steganography,forensics,web,crypto or OSINT and more☆14Nov 10, 2025Updated 3 months ago
- OpenRedirector is a powerful automation tool for detecting Open Redirect vulnerabilities in web applications☆17Oct 30, 2025Updated 4 months ago
- ☆19Jul 23, 2025Updated 7 months ago
- Really quickly build APKs on handheld device (smartphone or tablet) in Amazon, Android, Chromebook and Windows📲 See https://buildapks.g…☆12Dec 24, 2019Updated 6 years ago
- Mrco24-Lfi-Scanner is a high-speed Local File Inclusion (LFI) vulnerability scanning tool developed in the Go programming language. It's …☆13Dec 16, 2023Updated 2 years ago