violent-python3
Keylogger
Our great sponsors
violent-python3 | Keylogger | |
---|---|---|
4 | 2 | |
936 | 1,923 | |
- | - | |
1.3 | 2.6 | |
about 1 year ago | 7 days ago | |
Python | Python | |
- | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
violent-python3
- Recommend me a Cybersecurity book similar to ViolentPython
- Programming for hacking
- Software security
-
Is "Violent Python" a good book for beginners?
I don't recommend reading the old books violent python and blackhat python because they're written in python2 which is officially outdated. If you do read them, you have to not only learn programming, but be able to convert it to python3. There are already some conversions done in Github like this which you can use to read side by side with the book but I think it's still not good for a programming beginner to do. You're free to try though and see how it works for you.
Keylogger
What are some alternatives?
blackhat-python3 - Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
007-TheBond - This Script will help you to gather information about your victim or friend.
pythoncode-tutorials - The Python Code Tutorials
Black-Tool - Install the tools and start Attacking , black-tool v5.0 ! ⬛
nfstream - NFStream: a Flexible Network Data Analysis Framework.
Blank-Grabber - The most powerful stealer written in Python 3 and packed with a lot of features.
recon - Enumerate a target Based off of Nmap Results
BeeLogger - Generate Gmail Emailing Keyloggers to Windows.
GoodHound - Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.
logkeys - :memo: :keyboard: A GNU/Linux keylogger that works!
Cryptonite - A ransomware created for Windows OS. It is easy to test in a safe environment before deploying it to the victims. Developed using Python [GET https://api.github.com/repos/CYBERDEVILZ/Cryptonite: 403 - Repository access blocked]