Skip to content

darkcode0x/PBL4

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

23 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Project PBL4: Research on Keyloggers & Botnets for Educational Purposes

A proof-of-concept Keylogger/Botnet for academic and cybersecurity research purposes only.

⚠️ IMPORTANT WARNING ⚠️

This project was created solely for educational and academic research purposes. The objective is to understand the workings of malware (keyloggers, botnets) to enhance cybersecurity knowledge and develop effective countermeasures.

The use of the source code or knowledge from this project for any harmful, illegal, or privacy-invading activities is strictly prohibited. The author(s) bear no responsibility for any misuse arising from this project.

Introduction

PBL4 is a research project that simulates the operation of a basic malware system, consisting of two main components:

  1. Keylogger: A module capable of recording keystrokes on a target machine.
  2. Botnet: A network of infected computers (bots) remotely controlled by a Command & Control (C2) server.

This project is developed in a controlled environment (sandbox) to analyze attack vectors, communication techniques, and persistence methods of malware.

Research Objectives

  • To understand the mechanism of sensitive data collection by keyloggers.
  • To study the architecture and protocol of a simple Command & Control (C2) server.
  • To analyze how bots communicate with the C2 server to receive commands and send data.
  • To learn basic techniques for stealth and persistence on a victim's system.
  • To raise awareness and build a foundational knowledge for developing detection and prevention tools against similar malware.

Ethical and Legal Disclaimer

  • This product is solely an academic "Proof of Concept" (PoC) and should not be considered a fully functional attack tool.
  • Using this tool on any computer system without the explicit permission of the owner is illegal and may lead to criminal prosecution.
  • Always conduct tests in a virtualized environment (virtual machine) or an isolated network that you fully control.
  • Please adhere to current laws and ethical principles in the field of cybersecurity.

License

This project is released under the MIT License. Please see the LICENSE file for more details. The project is provided "AS IS", without warranty of any kind.

About

A proof-of-concept Keylogger/Botnet for academic and cybersecurity research purposes only.

Resources

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •