Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/jeroenvisser101/clepta
(PoC) Clepta is a modern keylogger.
https://github.com/jeroenvisser101/clepta
Last synced: 3 days ago
JSON representation
(PoC) Clepta is a modern keylogger.
- Host: GitHub
- URL: https://github.com/jeroenvisser101/clepta
- Owner: jeroenvisser101
- License: mit
- Created: 2015-01-12T00:00:30.000Z (almost 10 years ago)
- Default Branch: master
- Last Pushed: 2016-01-01T00:32:08.000Z (about 9 years ago)
- Last Synced: 2025-01-02T23:32:25.433Z (7 days ago)
- Language: JavaScript
- Homepage: https://jeroenvisser101.github.io/clepta/
- Size: 12.7 KB
- Stars: 6
- Watchers: 4
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Clepta
Clepta is greek for Thief. Clepta is a JavaScript library made to be a PoC to
show how easy it is to do targetted password extraction on websites.## What does it do?
Clepta is able to indentify forms with login details in them, and retrieve
them. It is then able to send the extracted information to a specified
endpoint.## How does it accomplish what it does?
Clepta easily finds forms based on the form's field types. Simply put, the
internal 'Finder' used to find login forms, looks for forms with a password
field and a normal text field. When both are present, a form is marked as login
form. It could of course be a registration form, but all we care about is the
data, so that doesn't really matter.## Why did you make this?
Well, I had this idea a while back, and wanted to illustrate how easy it is to
create a 'smart' keylogger, that just sends relevant data. This also
incorporates the fact that Chrome auto-fills the forms (using a similar method)
and this data is also there to be stolen.## How can this be used in a real-life scenario?
There are a few ways on how this could be used. One being to use this code in a
browser extension, infecting every page the user visits and storing it in the
user's `localStorage` and sending it when it has some more data (to save server
power). You could also do a MITM attack, inject this script in a page and work
with that.## Can I use this in my virus/malware/attack?
I'd prefer if you didn't.