6 Components & Libraries
Sortby
Get Keyboard,Mouse,ScreenShot,Microphone Inputs and Send to your Mail. Purpose of the project is testing the security of information systems
Hacking can be carried out in many ways. The most common form is the phishing scam, where hackers attempt to gain login names and passwords, or introduce malware into networked computing environments…
Python network worm that spreads on the local network and gives the attacker control of these machines. This code is not finished and works more like a "worm template" for you to get inspiration at t…
tools (py3 version) of Black Hat Python book.
⛤Keylogger Generator for Windows written in Python⛤ THIS SOFTWARE IS INTENDED ONLY FOR EDUCATION PURPOSES! DO NOT USE IT TO INFLICT DAMAGE TO ANYONE! USING MY APPLICATION YOU ARE AUTHOMATICALLY AGREE…
Hacking tool to seek host header injections and escalate it with other kind of vulns like web cache poissoning. In the next Youtube video I made you can check how to perform a Routing Based SSRF base…
Subscribe to our newsletter