A chrome extension to mess with the webcam
☆21Oct 27, 2018Updated 7 years ago
Alternatives and similar repositories for camera-hijack
Users that are interested in camera-hijack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- NoSecerets is a python script that is designed to crack hashes extremely fast. Faster even than Hashcat☆11Mar 13, 2022Updated 4 years ago
- A program to steal user information through a simple link☆13May 19, 2023Updated 2 years ago
- A simple log aggregation tool☆16Aug 30, 2025Updated 8 months ago
- Collect and filter location information from social network services.☆11Jun 14, 2020Updated 5 years ago
- An advance keylogger that works and also logs special keys.☆16May 27, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Keylogger for ethical hackers☆14Aug 25, 2021Updated 4 years ago
- This is a stealthier version of Keylogger-lkm, it introduces hiding techniques and also a command entering option.☆13Jan 27, 2023Updated 3 years ago
- ZigBee hacking tools and scripts☆14Mar 25, 2018Updated 8 years ago
- Teensy code to brute force a keylogger's unlock code☆15Sep 5, 2016Updated 9 years ago
- first program python to steal password microsoft edge all version browser, send info to email☆13Feb 11, 2021Updated 5 years ago
- Mobile phone PWN tools and scripts☆16Sep 20, 2020Updated 5 years ago
- steal password mozilla firefox ,windows,Linux☆10Oct 12, 2020Updated 5 years ago
- migrate EvilCrow-Keylogger for platformio☆10May 9, 2023Updated 2 years ago
- System wide keylogger for Mac and Windows #openFrameworks☆13Sep 5, 2011Updated 14 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Apple wireless research and tools☆19Jul 19, 2020Updated 5 years ago
- Really useful hacking tools.☆19Dec 16, 2023Updated 2 years ago
- Hacker Community Remote Access Trojan☆27Mar 3, 2022Updated 4 years ago
- Ping2death is a ddos to send packet over a user.. Its has a custom amount of packet☆15Sep 22, 2021Updated 4 years ago
- F-Droid repository for nightly builds of the Android app☆25Oct 21, 2024Updated last year
- Create an incident response triage toolkit for use with Windows or Linux.☆18Jun 14, 2020Updated 5 years ago
- A digispark supported keylogger.Only worked on W10.☆12Jul 11, 2022Updated 3 years ago
- Source Code Music Player Android☆34Mar 5, 2021Updated 5 years ago
- My collection of Termux Scripts☆18Oct 29, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Read-only mirror of android-vshell mirror from private git hosting.☆17Feb 26, 2021Updated 5 years ago
- Code 4rena Sandbox & Exploits☆14Mar 1, 2022Updated 4 years ago
- Offline ChatGPT using Large Language Model (LLM)☆14Mar 31, 2023Updated 3 years ago
- Updated AAGateway used to connect to master wifi☆10Oct 5, 2022Updated 3 years ago
- Quickly clone a website and launch an HTTP server to phish information with httphish.py 🐍☆50Mar 8, 2021Updated 5 years ago
- AnDroidInject0r is a Python script to inject existing Android applications with a Meterpreter payload. It can be used during penetrating …☆16Feb 22, 2021Updated 5 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- facebook bot ,like comment,download phone number, download email adress, delect all friends ...........etc☆20Jun 18, 2019Updated 6 years ago
- A javascript based botnet/C&C to remotely manage/control browsers.☆23Feb 4, 2022Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- [Deprecated] APIs for Reinforcement Learning☆13Jun 18, 2018Updated 7 years ago
- ☆24Nov 23, 2019Updated 6 years ago
- Gophish Python cli to perform huge phishing campaigns☆39Oct 19, 2018Updated 7 years ago
- Repository for the Udemy Course: "Build an Advanced Keylogger using C++ for Ethical Hacking!" with instructor Ermin Kreponic☆12Feb 1, 2018Updated 8 years ago
- Custom FiveM Framework developed by ThymonA☆11Feb 5, 2021Updated 5 years ago
- Fully FUD keylogger that can bypass windows 11 & windows 10 defender protection and all kinds of Antivirus protections also.☆19Oct 9, 2021Updated 4 years ago
- White-hat hacking keylogger☆18Apr 9, 2015Updated 11 years ago