All Projects → UndeadSec → Herakeylogger

UndeadSec / Herakeylogger

Licence: bsd-3-clause
Chrome Keylogger Extension | Post Exploitation Tool

Programming Languages

python
139335 projects - #7 most used programming language
python3
1442 projects

Projects that are alternatives of or similar to Herakeylogger

Torat
ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
Stars: ✭ 415 (+200.72%)
Mutual labels:  post-exploitation, keylogger
Stormkitty
🔑 Open source stealer written on C#, all logs will be sent to Telegram bot.
Stars: ✭ 198 (+43.48%)
Mutual labels:  keylogger, chrome
Cromos
Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.
Stars: ✭ 103 (-25.36%)
Mutual labels:  keylogger, chrome
Teardroid-phprat
🇮🇳 🤖 It's easy to use android botnet work without port forwarding, vps and android studio
Stars: ✭ 417 (+202.17%)
Mutual labels:  keylogger, post-exploitation
Postexploits
(windows) post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass etc..
Stars: ✭ 111 (-19.57%)
Mutual labels:  post-exploitation, keylogger
Chicago Brick
Software that displays content on a multi-node video wall.
Stars: ✭ 127 (-7.97%)
Mutual labels:  chrome
Codenav
Better code navigation in github
Stars: ✭ 133 (-3.62%)
Mutual labels:  chrome
Silenttrinity
An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
Stars: ✭ 1,767 (+1180.43%)
Mutual labels:  post-exploitation
Kdeconnect Chrome Extension
A browser extension to send pages and content from your browser to connected KDE Connect devices.
Stars: ✭ 124 (-10.14%)
Mutual labels:  chrome
Xstyle
A user styles manager for Firefox and Chrome
Stars: ✭ 138 (+0%)
Mutual labels:  chrome
Passcards
A 1Password-compatible command-line and web-based password manager
Stars: ✭ 134 (-2.9%)
Mutual labels:  chrome
Vue Electron Chrome
基于electron开发的应用浏览器
Stars: ✭ 132 (-4.35%)
Mutual labels:  chrome
Blocker Database
A global domain based database for NoScript, uBlock, uMatrix & ScriptSafe
Stars: ✭ 127 (-7.97%)
Mutual labels:  chrome
Evasor
A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies
Stars: ✭ 134 (-2.9%)
Mutual labels:  post-exploitation
Phpchrometopdf
A slim PHP wrapper around google-chrome to convert url to pdf or to take screenshots , easy to use and clean OOP interface
Stars: ✭ 127 (-7.97%)
Mutual labels:  chrome
Whatsapp Bulk Sender
Send bulk messages right from your WhatsApp Android Client or WhatsApp Web
Stars: ✭ 135 (-2.17%)
Mutual labels:  chrome
Squidwarc
Squidwarc is a high fidelity, user scriptable, archival crawler that uses Chrome or Chromium with or without a head
Stars: ✭ 125 (-9.42%)
Mutual labels:  chrome
Simple Chrome Custom Tabs
Easy integration of Chrome Custom Tabs into your project. Just connect it to your activity, and navigate to the external website styling your tab as you wish.
Stars: ✭ 131 (-5.07%)
Mutual labels:  chrome
Evilosx
An evil RAT (Remote Administration Tool) for macOS / OS X.
Stars: ✭ 1,826 (+1223.19%)
Mutual labels:  post-exploitation
Urql Devtools
A tool for monitoring and debugging urql during development
Stars: ✭ 131 (-5.07%)
Mutual labels:  chrome

Hera Chrome Keylogger

Post Exploitation Tool

MAINTAINERS

PREREQUISITES

  • Python 3.x
  • pip3
  • huepy from Python 3.x
  • PHP
  • sudo

TESTED ON

  • Kali Linux - Rolling Edition

  • Linux Mint - 18.3 Sylvia

  • Ubuntu - 16.04.3 LTS

  • MacOS High Sierra

CLONE

git clone https://github.com/UndeadSec/HeraKeylogger.git

RUNNING

cd HeraKeylogger
sudo apt-get install python3-pip -y
sudo pip3 install -r requirements.txt
python3 hera.py

SCREENSHOT

Shot

DISCLAIMER

TO BE USED FOR EDUCATIONAL PURPOSES ONLY

The use of the HeraKeylogger is COMPLETE RESPONSIBILITY of the END-USER. Developers assume NO liability and are NOT responsible for any misuse or damage caused by this program.

"DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE." Taken from LICENSE.

Donation

If you liked our work and want to support us, you can donate :D

Bitcoin Address: 1EmJ5KiAKzpyqGGHopAq9qukrVPS47T9bA

VIDEO DEMO

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].