All Projects → nairuzabulhul → KeyPlexer

nairuzabulhul / KeyPlexer

Licence: other
Capstone: Keylogger Trojan

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to KeyPlexer

Trojancockroach
A Stealthy Trojan Spyware
Stars: ✭ 424 (+1225%)
Mutual labels:  malware, trojan, keylogger
trolo
trolo - an easy to use script for generating Payloads that bypasses antivirus
Stars: ✭ 45 (+40.63%)
Mutual labels:  reverse-shell, malware, trojan
Networm
Python network worm that spreads on the local network and gives the attacker control of these machines.
Stars: ✭ 135 (+321.88%)
Mutual labels:  machine, malware, trojan
ToxicEye
👽 Program for remote control of windows computers via telegram bot. Written in C#
Stars: ✭ 305 (+853.13%)
Mutual labels:  malware, trojan, keylogger
Inferno
🔥 Modern command line tool for malware creation on Windows
Stars: ✭ 105 (+228.13%)
Mutual labels:  screenshot, malware, keylogger
ConTroll Remote Access Trojan
Created a VERY SIMPLE remote access Trojan that will establish administrative control over any windows machine it compromises.
Stars: ✭ 69 (+115.63%)
Mutual labels:  malware, trojan
Backdoor
A backdoor that runs on Linux and Windows
Stars: ✭ 36 (+12.5%)
Mutual labels:  screenshot, trojan
cerberus research
Research tools for analysing Cerberus banking trojan.
Stars: ✭ 110 (+243.75%)
Mutual labels:  malware, trojan
MsfMania
Python AV Evasion Tools
Stars: ✭ 388 (+1112.5%)
Mutual labels:  reverse-shell, malware
RSB-Framework
Windows/Linux - ReverseShellBackdoor Framework
Stars: ✭ 44 (+37.5%)
Mutual labels:  trojan, victim-machine
The-MALWARE-Repo
A repository full of malware samples.
Stars: ✭ 380 (+1087.5%)
Mutual labels:  malware, trojan
Spyware
Python-based spyware for Windows that logs the foreground window activites, keyboard inputs. Furthermore it is able to take screenshots and and run shell commands in the background.
Stars: ✭ 31 (-3.12%)
Mutual labels:  malware, keylogger
video-snapshot
Get snapshots from a video file in the browser 🎥 🌅
Stars: ✭ 63 (+96.88%)
Mutual labels:  screenshot, capture
Python-Keylogger
Python Tutorial - || Advanced Keylogger || Code Walk-through || Hacking/Info-Sec ||
Stars: ✭ 55 (+71.88%)
Mutual labels:  malware, keylogger
Dr0pFi
Using this tool, You can capture all WiFi Passwords stored on Windows Computer and mail them to your email account!
Stars: ✭ 38 (+18.75%)
Mutual labels:  malware, capture
1click-webpage-screenshot
Entire page Screenshot extension for Google Chrome. I'm developing open source extension for Google Chrome. All extension are free for use. Let's make Chrome great again!
Stars: ✭ 432 (+1250%)
Mutual labels:  screenshot, capture
claw
Source code of Claw Key logger previously sold on HackForums
Stars: ✭ 33 (+3.13%)
Mutual labels:  malware, keylogger
RoboThief-Telegram-Session-Stealer
Robo Thief is a software for steal telegram session .
Stars: ✭ 18 (-43.75%)
Mutual labels:  malware, trojan
keystats
A simple keylogger for macOS
Stars: ✭ 24 (-25%)
Mutual labels:  keystrokes, keylogger
PyIris
PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: ✭ 296 (+825%)
Mutual labels:  trojan, keylogger

Project Description:

The project explores operating systems vulnerabilities in protecting against common threats of malware. The project will be a demonstration of how malware type Trojan is created and executed in the targeted machines.

Keyplexer is a Remote Access Trojan (RAT) written in Python. It combines the functionalities of Keylogger with remote access abilities. Meaning, that not only the program records all movements of the user, but also has access to the machine live through the created backdoor or Trojan.

Features:

[x] Logging ALL keystrokes of the user daily and save them in log.txt file

[ ] Keystrokes are sanitized for accurate output (Ctrl, Alt, Enter)

[x] Capture the clipboard contents

[ ] Detects when the user is accessing special important websites such as social media, banks, etc

[x] Capture ALL active windows on the host machine every 2 min

[x] Conceal and Hide the logs directory with its file on the victim machine

[x] Detects and saves all open programs in the machine with their paths

[x] Sends the logs over email at the end every 1h

[x] Permanently delete the log files after sending them over email to conceal traces

[x] Capture screenshots of the user machine and send them via email

[X] List all the running processors in the system

[ ] Interact with the processor (run it , or kill it)

[X] Files are renamed to unsuspicious names to avoid detection

[x] Checks the victim machine for internet connection, if the target computer is not connected to the internet, all logs and images will be saved locally and once connected it will start sending them all

[ ] Send email or text when the user shuts down the computer, logs off or disconnects from the internet

[ ] Added Persistence to the machine, to avoid disconnection on the restart

[x] Gets the Wifi credentials on the Accessed Point

[x] Get all the history of browsers (Chrome, Firefox)

[ ] Get al histrory, cookies, autofill, and saved password * [Histroy is DONE]

[x] Keplexer evades all signature based Anti-viruses

[x] Fingerprint the system and get all the information

[x] IP detection

[x] Revsershell is added as backdoor trojan

[X] Interactive shell -- move flexiblly around the user directories using cd command

[X] Download/ upload file using the backdoor shell functionality * [Download is DONE]

[X] DELETE images and logs after sending them through email using [cover] command

[X] Multiple Clients

[x] Trun the script into an executable

[X] Add colors to the server menu --linux

Additioal Steps:

[ ] Bind the program to a file with an icon

[ ] Encrypt traffic accross the network using AES encryption

[ ] Detect virtual environment

[ ] Webcam logging

[ ] Microphone logging

[ ] Get the system loging credentials

Nextstep

[ ] Send email or text when the user shuts down the computer, logs off or disconnects from the internet

[X] Added Persistence to the machine, to avoid disconnection on the restart

[X] Copy the file to another location and delete the current one

[X] Edit the registry

[ ] TESTING --> additional testing is required

[ ] Keystrokes are sanitized for accurate output (Ctrl, Alt, Enter)

[ ] Detects when the user is accessing special important websites such as social media, banks, etc

[ ] Interact with the processor (run it , or kill it)

Cleaning

[1] Persistence --> clean up the function

[2] Copy and hide the files in the system

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].