suriyaa / keylogger
Open Source Python Keylogger Collection
☆176Updated last year
Alternatives and similar repositories for keylogger:
Users that are interested in keylogger are comparing it to the libraries listed below
- Pythonic ransomware proof of concept.☆218Updated 4 years ago
- A ctypes powered python keylogger.☆104Updated 5 years ago
- Inject malicious code into *.debs☆267Updated 2 years ago
- Dangerous Malwares☆201Updated 8 years ago
- Python Remote Access Trojan☆137Updated 4 years ago
- Worm implemented in Python☆81Updated 8 years ago
- A Phishing Dropper designed to Pentest.☆270Updated 7 years ago
- Various codes related to Ransomware Developement☆122Updated 7 years ago
- Keylogger Code In C++ Will Work On Window 7, 8, 8.1, And 10☆78Updated 6 years ago
- some python3 functions to add spreading features to any python backdoor☆51Updated 7 years ago
- Info and password stealer☆89Updated 7 years ago
- A python keylogger that does more than any other keylogger - Key logger, Clicks logger and Screenshots☆457Updated 3 months ago
- NXcrypt - 'python backdoor' framework☆365Updated 7 years ago
- This is Jester ransomware like, in Mr Robot movie (coded by Darlene S1E2,3), Please beware warning, after start you can't recover the fil…☆359Updated 4 years ago
- This tool creates almost undetectabe trojan virus to exploit windows machine.☆134Updated 7 years ago
- USB / CD / DVD autorun password stealer☆264Updated 5 years ago
- WannaCry Ransomware☆134Updated 7 years ago
- Automatically hacking usb stick (gets passwords + keylogger)☆222Updated 5 years ago
- Seeing how easy it is to create ransomware.☆46Updated 2 years ago
- Bug7sec Team - ransomware open source (web)☆130Updated 7 years ago
- Multiplatform payload dropper☆259Updated 3 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆369Updated 8 years ago
- Python Tutorial - || Advanced Keylogger || Code Walk-through || Hacking/Info-Sec ||☆84Updated last week
- A script written lazily for generating cross-platform backdoors on the go :)☆184Updated 6 years ago
- Help a buddy prank his colleagues! Show your mettle with spoofing emails, malicious attachments, spoofing sms, and spoofing phone calls t…☆97Updated 8 years ago
- Windows Remote-Access-Trojan☆633Updated 8 years ago
- Linux bash script automation for metasploit☆258Updated 5 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆223Updated 3 years ago