All Projects → Spykeyboard → Similar Projects or Alternatives

596 Open source projects that are alternatives of or similar to Spykeyboard

Flux Keylogger
🔖 Modern Javascript keylogger with web panel
Stars: ✭ 122 (+28.42%)
Mutual labels:  hacking, keylogger
Saint
👁 (s)AINT is a Spyware Generator for Windows systems written in Java. [Discontinued]
Stars: ✭ 522 (+449.47%)
Mutual labels:  hacking, keylogger
Logkeys
📝 ⌨️ A GNU/Linux keylogger that works!
Stars: ✭ 518 (+445.26%)
Mutual labels:  hacking, keylogger
Paradoxiarat
ParadoxiaRat : Native Windows Remote access Tool.
Stars: ✭ 395 (+315.79%)
Mutual labels:  hacking, keylogger
Inferno
🔥 Modern command line tool for malware creation on Windows
Stars: ✭ 105 (+10.53%)
Mutual labels:  hacking, keylogger
Richkware
Framework for building Windows malware, written in C++
Stars: ✭ 315 (+231.58%)
Mutual labels:  hacking, keylogger
Keylogger
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Stars: ✭ 604 (+535.79%)
Mutual labels:  hacking, keylogger
Swift Keylogger
Keylogger for mac written in Swift using HID
Stars: ✭ 995 (+947.37%)
Mutual labels:  hacking, keylogger
Technowlogger
TechNowLogger is Windows/Linux Keylogger Generator which sends key-logs via email with other juicy target info
Stars: ✭ 172 (+81.05%)
Mutual labels:  hacking, keylogger
Wifipassword Stealer
Get All Registered Wifi Passwords from Target Computer.
Stars: ✭ 97 (+2.11%)
Mutual labels:  hacking, keylogger
Spytrojan keylogger
[Solo para programadores] Troyano espía | Keylogger solo para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. | Envío de registro mediante [Base de Datos], [Gmail] o [BotTelegram].
Stars: ✭ 32 (-66.32%)
Mutual labels:  hacking, keylogger
Badusb botnet
👥😈 Infect a pc with badusb and establish a connection through telegram.
Stars: ✭ 32 (-66.32%)
Mutual labels:  hacking, keylogger
Keylogger
A simple keylogger for Windows, Linux and Mac
Stars: ✭ 1,007 (+960%)
Mutual labels:  hacking, keylogger
Ysf
YSF Server Functions
Stars: ✭ 77 (-18.95%)
Mutual labels:  hacking
Cve 2019 0708 Tool
A social experiment
Stars: ✭ 87 (-8.42%)
Mutual labels:  hacking
Burp Bounty Profiles
Burp Bounty profiles compilation, feel free to contribute!
Stars: ✭ 76 (-20%)
Mutual labels:  hacking
Movies For Hackers
🎬 A curated list of movies every hacker & cyberpunk must watch.
Stars: ✭ 8,884 (+9251.58%)
Mutual labels:  hacking
Apac Conferences
A community contributed consolidated list of InfoSec meetups in the Asia Pacific region.
Stars: ✭ 90 (-5.26%)
Mutual labels:  hacking
Pentesting toolkit
🏴‍☠️ Tools for pentesting, CTFs & wargames. 🏴‍☠️
Stars: ✭ 1,268 (+1234.74%)
Mutual labels:  hacking
Deadtrap
An OSINT tool to gather information about the real owner of a phone number
Stars: ✭ 73 (-23.16%)
Mutual labels:  hacking
Lor Axe
🪓 a multi-threaded, low-bandwidth HTTP DOS tool
Stars: ✭ 72 (-24.21%)
Mutual labels:  hacking
One Lin3r
Gives you one-liners that aids in penetration testing operations, privilege escalation and more
Stars: ✭ 1,259 (+1225.26%)
Mutual labels:  hacking
Chaos
🔥 CHAOS is a Remote Administration Tool that allow generate binaries to control remote operating systems.
Stars: ✭ 1,168 (+1129.47%)
Mutual labels:  hacking
Exploits
Miscellaneous exploit code
Stars: ✭ 1,157 (+1117.89%)
Mutual labels:  hacking
Stretcher
Tool designed to help identify open Elasticsearch servers that are exposing sensitive information
Stars: ✭ 91 (-4.21%)
Mutual labels:  hacking
Redteam vul
红队作战中比较常遇到的一些重点系统漏洞整理。
Stars: ✭ 1,271 (+1237.89%)
Mutual labels:  hacking
Zynix Fusion
zynix-Fusion is a framework that aims to centralize, standardizeand simplify the use of various security tools for pentest professionals.zynix-Fusion (old name: Linux evil toolkit) has few simple commands, one of which is theinit function that allows you to define a target, and thus use all the toolswithout typing anything else.
Stars: ✭ 84 (-11.58%)
Mutual labels:  hacking
Solved Hacking Problem
✔️ CTF problems and solutions solved by Qwaz
Stars: ✭ 67 (-29.47%)
Mutual labels:  hacking
Githacktools
The best Hacking and PenTesting tools installer on the world
Stars: ✭ 78 (-17.89%)
Mutual labels:  hacking
Blackrat
BlackRAT - Java Based Remote Administrator Tool
Stars: ✭ 87 (-8.42%)
Mutual labels:  hacking
Griefing Methods
A documentation about how to hack Minecraft servers
Stars: ✭ 76 (-20%)
Mutual labels:  hacking
Cve 2019 0604
cve-2019-0604 SharePoint RCE exploit
Stars: ✭ 91 (-4.21%)
Mutual labels:  hacking
Phpsploit
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Stars: ✭ 1,188 (+1150.53%)
Mutual labels:  hacking
Hookso
linux动态链接库的注入修改查找工具 A tool for injection, modification and search of linux dynamic link library
Stars: ✭ 87 (-8.42%)
Mutual labels:  hacking
Seginfofaq
FAQ del mundo de la seguridad informática en español.
Stars: ✭ 73 (-23.16%)
Mutual labels:  hacking
Archivist
A ctypes powered python keylogger.
Stars: ✭ 92 (-3.16%)
Mutual labels:  keylogger
Sandmap
Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.
Stars: ✭ 1,180 (+1142.11%)
Mutual labels:  hacking
In Spectre Meltdown
This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
Stars: ✭ 86 (-9.47%)
Mutual labels:  hacking
Givingstorm
Infection vector that bypasses AV, IDS, and IPS. (For now...)
Stars: ✭ 72 (-24.21%)
Mutual labels:  hacking
Instabruteforce
hacking-tool termux-tools termux noob-friendly instagram-bot bruteforce-password-cracker wordlist-technique
Stars: ✭ 86 (-9.47%)
Mutual labels:  hacking
Netmap.js
Fast browser-based network discovery module
Stars: ✭ 70 (-26.32%)
Mutual labels:  hacking
Jenkins Shell
Automating Jenkins Hacking using Shodan API
Stars: ✭ 84 (-11.58%)
Mutual labels:  hacking
Pillager
Pillage filesystems for sensitive information with Go.
Stars: ✭ 64 (-32.63%)
Mutual labels:  hacking
Ssh Mitm
SSH man-in-the-middle tool
Stars: ✭ 1,328 (+1297.89%)
Mutual labels:  hacking
Fail2ban.webexploits
This custom Fail2Ban filter and jail will deal with all scans for common Wordpress, Joomla and other Web Exploits being scanned for by automated bots and those seeking to find exploitable web sites.
Stars: ✭ 67 (-29.47%)
Mutual labels:  hacking
Gitjacker
🔪 Leak git repositories from misconfigured websites
Stars: ✭ 1,249 (+1214.74%)
Mutual labels:  hacking
B1tifi
ssh management tool to provides commandline access to a remote system running SSH server
Stars: ✭ 65 (-31.58%)
Mutual labels:  hacking
Rhme 2017
Riscure Hack Me embedded hardware CTF 2017-2018.
Stars: ✭ 65 (-31.58%)
Mutual labels:  hacking
Keylogger
A powerful C keylogger for Windows.
Stars: ✭ 89 (-6.32%)
Mutual labels:  keylogger
Geo Recon
An OSINT CLI tool desgined to fast track IP Reputation and Geo-locaton look up for Security Analysts.
Stars: ✭ 82 (-13.68%)
Mutual labels:  hacking
Xshock
XSHOCK Shellshock Exploit
Stars: ✭ 65 (-31.58%)
Mutual labels:  hacking
Cloakify
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+1095.79%)
Mutual labels:  hacking
Beef Over Wan
Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]
Stars: ✭ 82 (-13.68%)
Mutual labels:  hacking
Dr0p1t Framework
A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+1091.58%)
Mutual labels:  hacking
Cyberweapons
Automated Cyber Offense
Stars: ✭ 64 (-32.63%)
Mutual labels:  keylogger
H4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+10901.05%)
Mutual labels:  hacking
Rvd
Robot Vulnerability Database. An archive of robot vulnerabilities and bugs.
Stars: ✭ 87 (-8.42%)
Mutual labels:  hacking
Msf Venom Cheatsheet
Single Page Cheatsheet for common MSF Venom One Liners
Stars: ✭ 81 (-14.74%)
Mutual labels:  hacking
Knowledge Base
pdf,txt,djvu, various useful books
Stars: ✭ 63 (-33.68%)
Mutual labels:  hacking
Chimay Red
Mikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.
Stars: ✭ 63 (-33.68%)
Mutual labels:  hacking
1-60 of 596 similar projects