The use of this tool is strictly for only benevolent or educational purposes. Any malevolent intention or misuse of Espion could certainly put your life at risk. Henceforth, use this tool cautiously.
Espion (Spy in French) is a bijou keylogger tool to capture any key that the user on a target machine presses on his/her keyboard. Espion supports 1:M connection. 1:M is a notation for one server and many clients.
Keyloggers are spyware tools (hence the name, Espion) that capture 'keystrokes' on a target computer and reflect the captured data in real-time and/or keep it stored in a log file.
Espion is quite an easy tool to use. If you get doubious on how to use it, on the terminal type the following command:
python espion.py -h
OR python espion.py --help
.
Go as per this command flow:
git clone https://github.com/AnuragRSimha/Espion.git
cd Espion
Cloning.the.repository.mp4
Before proceeding, be certain to be a super user (root) to use Espion. Also install the keyboard module in python [pip install keyboard
].
Follow these steps to achieve a triumphant execution:
- Confirm the victim machine(s) and the attacker machine.
- On the attacker machine, run the generator program first (
python generator.py
). - Enter all the details asked for into the prompt.
- Remember the IP address and the port number that's designated.
- Once again, on the attacker machine, run the listener program (
python espion.py <IP> <PORT>
). - Now, head to the victim machine.
- Run the program titled 'victim.py' on the victim machine (
python victim.py
). - Type anything on the target machine(s). Then monitor/observe the output received on the attacker machine (Optional: Connect another victim to the attacker machine.).
Running.Espion.mp4
Since the shift key was pressed for a long duration, the duplicate entries are perspicuous.
- Monitor user activity on a local network.
- Record usernames and passwords (for legal purposes only).
- Designed and developed by Anurag.R.Simha.
- Made in Karnataka, South India.
- Designed with python.
- Concept(s) used: Socket Programming in Python.
Espion is not OS-specific.
All the details are stored in a keystroke log file on the same directory where espion.py program was running. Remember to terminate the execution of that program before browsing the log file. It's titled as 'Keystroke log file (current date).txt'.
Only a few points are listed here.
As per the Indian law, the accused can also be jailed under the following (suitable) sections:
- Sec. 73: Publishing False Digital Signature Certificates.
- Sec. 65: Tampering with Computer Source Documents.
- Sec. 72: Breach of Confidentiality and Privacy.
- Sec. 463: Forgery of Electronic Records.
- Sec. 420: Bogus Websites & Cyber Fraud.
The cyber security laws that are normally applied in case of cyber attacks are as follows (as per the British law):
- The Privacy and Electronic Communications Regulations 2003 (PECR)
- Computer Misuse Act 1990 (CMA)
- Investigatory powers Act 2016 (IPA)
- Fraud Act 2006
- Theft Act 1968
- Theft Act 1978
- Forgery and Counterfeiting Act 1981
- Proceeds of crime act 2002 (POCA)
- Data protection act 2018 (DPA)
- Official Secrets Act 1989