Malware and malicious applications database
-
Updated
Jun 12, 2024 - Java
Malware and malicious applications database
Discover LazyOwn, the ultimate solution for automating the search and analysis of binaries with special permissions on both Linux and Windows systems. Our powerful tool simplifies pentesting, making it more efficient and effective. Watch this video to learn how LazyOwn can streamline your security assessments and enhance your cybersecurity toolkit.
50 star bby stealer = open sc leak 🦊 🧊 Fully Undetected Grabber (Grabs Wallets, Passwords, Cookies, Autofills, Information, Discord, Telegram)
growtopia stealer with discord webhook
Very powerful stealer + miner + rat + keylogger + clipper
🤖 python program to automatically create documentations - could also be used as a keylogger
a simple keylogger in python that sends the keystrokes to the server
Red Script with Python
Keylogger written in Python 3.11 that sends all the logs to gmail account via smtplib.
The most powerful Stealer-Builder FUD with hundred of features.
This is the simplest android Keylogger for education and research only. Updates and support are there
Prometheus software Very powerful stealer + miner + rat + keylogger + clipper for free
A personal static website built hosted on GitHub Pages
Advanced RAT written in Python language, fully controllable through Discord with dedicated GUI builder to make preparation easier.
Simple Python Keylogger
Implementation of Simple Keylogger Program
Simple keylogger.
This repo consists of a prototype of the malware called BloodAlchemy. The analysis was done by ElasticLabs and this repo consists of a small POC.
Add a description, image, and links to the keylogger topic page so that developers can more easily learn about it.
To associate your repository with the keylogger topic, visit your repo's landing page and select "manage topics."