Jump to content
YOUR-AD-HERE
HOSTING
TOOLS
SERVICE

Search the Community

Showing results for tags 'keylogger'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Categories

  • Files
  • Online Book
  • Services

Categories

  • Hacking

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

Found 23 results

  1. Un keylogger es un tipo de software o hardware diseñado para registrar y almacenar las pulsaciones de teclado de un usuario. Los keyloggers se utilizan a menudo con fines de vigilancia y pueden ser instalados en un ordenador o dispositivo móvil sin el conocimiento o el consentimiento del usuario. Existen diferentes tipos de keyloggers, incluyendo keyloggers de software y keyloggers de hardware. Los keyloggers de software son programas que se instalan en un ordenador y rastrean las pulsaciones de teclado del usuario. Los keyloggers de hardware son dispositivos físicos que se conectan a un ordenador o dispositivo móvil y registran las pulsaciones de teclado de ese dispositivo. Los keyloggers se utilizan a menudo para vigilar a los empleados en el lugar de trabajo o a los miembros de la familia en el hogar. También pueden utilizarse para capturar contraseñas y otra información confidencial, lo que los convierte en una amenaza para la seguridad. Es importante tener precaución al descargar e instalar software y conectar dispositivos externos a un ordenador o dispositivo móvil. Utilizar un software de seguridad de confianza y crear contraseñas seguras también puede ayudar a protegerse contra los keyloggers y otras formas de vigilancia no autorizada. En resumen, un keylogger es un tipo de software o hardware diseñado para registrar y almacenar las pulsaciones de teclado de un usuario. Los keyloggers se utilizan a menudo con fines de vigilancia y pueden ser instalados en un ordenador o dispositivo móvil sin el conocimiento o el consentimiento del usuario. Es importante tener precaución al descargar e instalar software y conectar dispositivos externos a un ordenador o dispositivo móvil y utilizar un software de seguridad de confianza y contraseñas seguras para protegerse contra los keyloggers y otras formas de vigilancia no autorizada.
  2. Un keylogger es un tipo de software o hardware diseñado para registrar y almacenar las pulsaciones de teclado de un usuario. Los keyloggers se utilizan a menudo con fines de vigilancia y pueden ser instalados en un ordenador o dispositivo móvil sin el conocimiento o el consentimiento del usuario. Existen diferentes tipos de keyloggers, incluyendo keyloggers de software y keyloggers de hardware. Los keyloggers de software son programas que se instalan en un ordenador y rastrean las pulsaciones de teclado del usuario. Los keyloggers de hardware son dispositivos físicos que se conectan a un ordenador o dispositivo móvil y registran las pulsaciones de teclado de ese dispositivo. Los keyloggers se utilizan a menudo para vigilar a los empleados en el lugar de trabajo o a los miembros de la familia en el hogar. También pueden utilizarse para capturar contraseñas y otra información confidencial, lo que los convierte en una amenaza para la seguridad. Es importante tener precaución al descargar e instalar software y conectar dispositivos externos a un ordenador o dispositivo móvil. Utilizar un software de seguridad de confianza y crear contraseñas seguras también puede ayudar a protegerse contra los keyloggers y otras formas de vigilancia no autorizada. En resumen, un keylogger es un tipo de software o hardware diseñado para registrar y almacenar las pulsaciones de teclado de un usuario. Los keyloggers se utilizan a menudo con fines de vigilancia y pueden ser instalados en un ordenador o dispositivo móvil sin el conocimiento o el consentimiento del usuario. Es importante tener precaución al descargar e instalar software y conectar dispositivos externos a un ordenador o dispositivo móvil y utilizar un software de seguridad de confianza y contraseñas seguras para protegerse contra los keyloggers y otras formas de vigilancia no autorizada. View full article
  3. Stealer written on C#, logs will be sent to your Discord channel using a webhook. Disclaimer This program is for educational purposes only. How you use this program is your responsibility. I will not be held accountable for any illegal activities. 🔱 Data extraction: AntiAnalysis (VirtualBox, SandBox, Debugger, VirusTotal, Any.Run) Get system info (Version, CPU, GPU, RAM, IPs, BSSID, Location, Screen metrics, Installed apps) Chromium based browsers (passwords, credit cards, cookies, history, autofill, bookmarks) Firefox based browsers (db files, cookies, history, bookmarks) Internet explorer/Edge (passwords) Saved wifi networks & scan networks around device (SSID, BSSID) File grabber (Documents, Images, Source codes, Databases, USB) Detect banking & cryptocurrency services in browsers Steam, Uplay, Battle.Net, Minecraft session Install keylogger & clipper Desktop & Webcam screenshot ProtonVPN, OpenVPN, NordVPN Crypto Wallets Zcash, Armory, Bytecoin, Jaxx, Exodus, Ethereum, Electrum, AtomicWallet, Guarda, Coinomi, Litecoin, Dash, Bitcoin Crypto Wallet Extensions from Chrome & Edge Binance, coin98, Phantom, Mobox, XinPay, Math10, Metamask, BitApp, Guildwallet, iconx, Sollet, Slope Wallet, Starcoin, Swash, Finnie, KEPLR, Crocobit, OXYGEN, Nifty, Liquality, Auvitas wallet, Math wallet, MTV wallet, Rabet wallet, Ronin wallet, Yoroi wallet, ZilPay wallet, Exodus, Terra Station, Jaxx. Messenger Sessions, Accounts, Tokens Discord, Telegram, ICQ, Skype, Pidgin, Outlook, Tox, Element, Signal Directories structure Filezilla hosts Process list Product key Autorun module Features: These functions will become available in the builder only if you have autorun enabled. 🎹 Keylogger: The keylogger will turn on if the user is texting in the chat or using the bank's website. 📋 Clipper: Clipper turns on and replaces crypto wallet addresses in the clipboard when a user makes a transaction. 📷 Webcam screenshots: Webcam screenshots will be taken if the user is watching something obscene on the Internet. Build_2022.05.12_13-13 Latest a verry little change This change will fix for the upcomming change to use with Antivirus Evasion Tool [hide][Hidden Content]] Server Scan [Hidden Content]
  4. Best Free Keylogger Pro – is a solution to monitor what your children or employees are doing on their computer. Features • Record Keystrokes • Monitor Clipboard • Capture Screenshots • Monitor Internet Activities • Monitor Local Applications • “Smart Read” Filter • Advanced Filtering • HTML Reports • Limit by User/Application • Scheduled Monitoring • Encrypted Log Files • Password Protection • Delivery via Email, FTP, LAN, USB • Automatic Log Clearance • Invisible Mode • Automatic Uninstallation • Parental Controls • Web Filtering • Time Limiting Internet Access • Internet Blocking • Application Blocking [Hidden Content] [hide][Hidden Content]]
  5. KEYLOGGER ~ REMOTE ACCESS ~ DDOS ~ ENCRYPTER | 2020 Webcam screenshot, Desktop screenshot, Microphone recorder, Stealer(Passwords, Credit Cards, Cookies, History, Bookmarks), Keylogger, Autorun(Registry, Taskscheduler, StartupDIR), DDoS(HTTP, UDP, SYN, ICMP, SLOWLORIS), Bruteforce (SSH, FTP, Telnet), TaskManager, Port Scanner, Wifi scanner, File encryptor/dycryptor, Get installed antivirus, Check if in VirtualBox, SandBox, Debugger, Power control, Block system input, BSoD, ForkBomb, Text to speech, Clipboard control, System volume control, Send key press, Move cursor, Get cursor position, Get active window title, Get battery status, Min/Max all windows, Change wallpapers, Download & Upload file(anonfile.com), Get BSSID, Get coordinates by BSSID, WHOIS, Geoplugin, VirusTotal checker. Create webcame S.S : inferno.exe WEBCAM_SCREENSHOT "screenshot.jpg" "4500" "1" Disable monitor : inferno.exe MONITOR "OFF" [Hidden Content]
  6. Tested Gray Keylogger v3 capture all keystrokes and screenshot and send it via provided gmail. Features Easy Graphical User Interface Auto Startup as system starts Low size + Low memory/CPU consompsion Added Stealth mode (hides after running) Run only when any keyboard key is pressed Whats new added ? Capture keystrokes in memory Window title also added with keystrokes Sends JPEG screenshot in specified quality as attachment Stub in multple languages (VB,C#) Multiple Compilation Modes (Winexe,Console,Library) ErrorReporting (Helpfull for developers or Turn off if not needed) Added Icon support [HIDE][Hidden Content]] Server Scan [Hidden Content]
  7. [HIDE][Hidden Content]] Info: Sseur Changelogs [Hidden Content]
  8. Info: [HIDE][Hidden Content]] # Current Version: 1.2.0.0 ############################################## # ############################################## 1.2.0.0 - Added the Assembly Changer and Icon Changer. - Updated installation method. - Updated dynamic stub library. 1.1.0.0 - Added process manager protection. - Added ip logger function. - Added dynamic stub library. 1.0.0.1 - Fix single instance issue. - Fix the encryption error on mutex. Server Scan [Hidden Content]
  9. Info: Sales: [Hidden Content] [Hidden Content]
  10. Spyix Personal Monitor Main features: Remote monitoring via secure web accountMonitor your computer activities through a secured web account by logging in from any computer remotely. This means you can monitor your computer without having physical access to it. Keylogger (keystrokes logging)With the keystrokes logger, you can see all the keystrokes that are made on your computer, even if they have been removed. NEW! Live ViewingWatching the screen in live mode Screenshots captureIt takes screenshot of the desktop view without the user knowing it. Making snapshots from user web cameraIt takes snapshots of the activities carried out on your computer, by using the web camera of the user.(available for PRO license) Microphone Voice SurveillanceSilent sound recording is activated by excess the microphone level (surround sound level), by scheduler, on start or resumption of user activity(available for PRO license) WEB Camera SurveillanceSilent video recording is activated by excess the microphone level (surround sound level), by scheduler, on start or resumption of user activity(available for PRO license) Invisible modeThe running program will not be shown to the user in the list of running and installed applications, desktop tray, Start menu so it will not be obvious to the user. Undetectable to antivirus softwareUnlike other applications, this program is not susceptible or detectable by anti-viruses, w[Hidden Content]hich prevents them from blocking it. The monitoring system has special algorithms which prevents its detection. Remote UninstallationYou can remove Spyrix Personal Monitor on the target PC remotely – through secure web account. Remote monitoring from any place and any device (PC, tablet, smartphone) Clipboard controlThe application features clipboard control and monitors and records all the activities in the form of the programs and applications that are run on the system. Facebook + Social Networking Activity It monitors and records the activities carried out on social media platforms like Facebook, My Space, Twitter etc. Skype (Two-way dialogue interception) 20+ Popular IM Messengers ActivityIt monitors the activities of more than 20 renowned Messengers such as MSN and ICQ. Search Engines MonitoringRecords the searches that are carried on search engines such as Google, Bing, Yahoo and AOL. This includes recording of keywords that are used for making the searches. URL monitoringURL monitoring allows you to know what websites and pages the user visited. Blocking sites: by categories (for example adult, dating), blacklist of URLs, blacklist of keywords.You can block websites by classifying them as adult or inappropriate and can also block the use of certain keywords. Apps activityView all running applications including games and iTunes E-mail, FTP, LAN log deliveryIt also features log delivery through email and FTP where logs are sent to in certain intervals of time. Alert keywordsIt renders keyword alerts to enable you to know the keywords that are being used to make web searches through your computer system. Analytics moduleAlso included in this program is the feature of Analytics module which is used for report generation and other services. User ActivityIt keeps a complete track on the user activities and maintains record. “Black List” Sites (Alert URLs)It also renders URL alerts by blacklisting the URLs of sites. Removable Drives (USB, HDD, SD) ControlThe activities of removable drives such as HDD, USB and SD can be both monitored and controlled. Printer ControlThis program also has the trait of Printer Control which allows controlling the printer activities on the system. Stand-alone Report with ScreenshotsThe application renders complete standalone reports coupled with screen shots. Spyrix Personal Monitor is a powerful multifunctional program for full and detailed monitoring of user activity, including activity on social networks. The program is perfect for parental control and control of employees. Spyrix Personal Monitor allows detailed recording of all user activities. Spyrix Personal Monitor will help you solve the problem of monitoring your children without being caught. You will always know what you child was doing while using the PC. Spyrix Personal Monitor is a powerful protection tool from leakage of corporate secrets (DLP – data loss prevention). Nowadays on the market of data loss prevention (DLP) software there are lots of solutions that often cost thousands of dollars and in consequence of which are not available for small and medium companies. Spyrix Personal Monitor is a reasonably priced but quite effective product for solving problems of secret information leakage and employees activity control that allows small companies protecting themselves from unfair workers and problems with leakage of secret information. [Hidden Content]
  11. Video: [HIDE] Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  12. Download [Hidden Content] Pass: level23hacktools.com
  13. Download [Hidden Content] Pass level23hacktools
  14. How to Protect Yourself from Keylogger Attacks And that's how easy it is for hackers to see and record every keystroke you press on your computer. When a hacker has an unnoticed backdoor on your computer, anything is possible, but there are a few things you can do to minimize the risk of having your keys captured: [Hidden Content]
  15. How to Protect Yourself from Keylogger Attacks [Hidden Content]
  16. Download: [hide][Hidden Content]] Password: level23hacktools.com
  17. Hello , i have a keylogger extension chrome, Mozilla source code and tutoriel one youtub code source github
  18. Download: [hide][Hidden Content]] Password: level23hacktools.com
  19. Bomerang keylogger. (23.04.18) About : The keylogger is composed by 2 files Logger.exe and Injector.dll. The Logger.exe is combination of win elevation exploit and a reflecrive dll loader. 1) Logger.exe abuse of 0day vulnerability to get NT AUTHORITY\SYSTEM. (not tested on win 10) 2) Inject Injector.dll in Winlogon.exe process. The Injector.dll logs keystrokes from every user that logs on computer. 1) Once Injected Debug_Priv function check for valid privs. 2) If done, The keylogger will logs store keylogs at C://here.txt Statut : The stuff is fud for this time. --------------------------------------------------------------------------------- Enjoy : -> [Hidden Content]
  20. Full credit to original cracker (kalipo) Its another hf product....just posting for anyone who wishes to use it SALES THREAD: Mirror: [HIDE][Hidden Content]]
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.