Keylogger
violent-python3
Keylogger | violent-python3 | |
---|---|---|
2 | 4 | |
1,928 | 936 | |
- | - | |
2.3 | 1.3 | |
15 days ago | about 1 year ago | |
Python | Python | |
Apache License 2.0 | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Keylogger
violent-python3
- Recommend me a Cybersecurity book similar to ViolentPython
- Programming for hacking
- Software security
-
Is "Violent Python" a good book for beginners?
I don't recommend reading the old books violent python and blackhat python because they're written in python2 which is officially outdated. If you do read them, you have to not only learn programming, but be able to convert it to python3. There are already some conversions done in Github like this which you can use to read side by side with the book but I think it's still not good for a programming beginner to do. You're free to try though and see how it works for you.
What are some alternatives?
007-TheBond - This Script will help you to gather information about your victim or friend.
blackhat-python3 - Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Black-Tool - Install the tools and start Attacking , black-tool v5.0 ! ⬛
pythoncode-tutorials - The Python Code Tutorials
Blank-Grabber - The most powerful stealer written in Python 3 and packed with a lot of features.
nfstream - NFStream: a Flexible Network Data Analysis Framework.
BeeLogger - Generate Gmail Emailing Keyloggers to Windows.
recon - Enumerate a target Based off of Nmap Results
GoodHound - Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.
logkeys - :memo: :keyboard: A GNU/Linux keylogger that works!
Cryptonite - A ransomware created for Windows OS. It is easy to test in a safe environment before deploying it to the victims. Developed using Python [GET https://api.github.com/repos/CYBERDEVILZ/Cryptonite: 403 - Repository access blocked]