All Projects → kernc → Logkeys

kernc / Logkeys

Licence: other
📝 ⌨️ A GNU/Linux keylogger that works!

Projects that are alternatives of or similar to Logkeys

Wifipassword Stealer
Get All Registered Wifi Passwords from Target Computer.
Stars: ✭ 97 (-81.27%)
Mutual labels:  hacking, cybersecurity, keylogger
Keylogger
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Stars: ✭ 604 (+16.6%)
Mutual labels:  hacking, cybersecurity, keylogger
PyIris
PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: ✭ 296 (-42.86%)
Mutual labels:  cybersecurity, keylogger
argus
Argus Advanced Remote & Local Keylogger For macOS and Windows
Stars: ✭ 87 (-83.2%)
Mutual labels:  cybersecurity, keylogger
KeyLy
A powerfull and awesome Keylogger(Your keyboard and your mouse) realy helpfull for hackers! :-P (C/C++)
Stars: ✭ 17 (-96.72%)
Mutual labels:  keyboard, keylogger
Caldera
Automated Adversary Emulation Platform
Stars: ✭ 3,126 (+503.47%)
Mutual labels:  hacking, cybersecurity
Payloads
Git All the Payloads! A collection of web attack payloads.
Stars: ✭ 2,862 (+452.51%)
Mutual labels:  hacking, cybersecurity
Search That Hash
🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡
Stars: ✭ 466 (-10.04%)
Mutual labels:  hacking, cybersecurity
Bbrecon
Python library and CLI for the Bug Bounty Recon API
Stars: ✭ 169 (-67.37%)
Mutual labels:  hacking, cybersecurity
Xxe Injection Payload List
🎯 XML External Entity (XXE) Injection Payload List
Stars: ✭ 304 (-41.31%)
Mutual labels:  hacking, cybersecurity
Phishapi
Comprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!
Stars: ✭ 272 (-47.49%)
Mutual labels:  hacking, cybersecurity
Reverse Engineering Tutorial
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 5,763 (+1012.55%)
Mutual labels:  hacking, cybersecurity
Lockphish
Lockphish it's the first tool (07/04/2020) for phishing attacks on the lock screen, designed to grab Windows credentials, Android PIN and iPhone Passcode using a https link.
Stars: ✭ 186 (-64.09%)
Mutual labels:  hacking, cybersecurity
Hack Tools
The all-in-one Red Team extension for Web Pentester 🛠
Stars: ✭ 2,750 (+430.89%)
Mutual labels:  hacking, cybersecurity
Ntlmrecon
Enumerate information from NTLM authentication enabled web endpoints 🔎
Stars: ✭ 252 (-51.35%)
Mutual labels:  hacking, cybersecurity
Technowlogger
TechNowLogger is Windows/Linux Keylogger Generator which sends key-logs via email with other juicy target info
Stars: ✭ 172 (-66.8%)
Mutual labels:  hacking, keylogger
python-keylogger
Advanced Pure-Python Keylogger
Stars: ✭ 64 (-87.64%)
Mutual labels:  keyboard, keylogger
A Red Teamer Diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (-26.25%)
Mutual labels:  hacking, cybersecurity
Flux Keylogger
🔖 Modern Javascript keylogger with web panel
Stars: ✭ 122 (-76.45%)
Mutual labels:  hacking, keylogger
Hackercamp
Enine boyuna siber güvenlik
Stars: ✭ 149 (-71.24%)
Mutual labels:  hacking, cybersecurity

logkeys - a GNU/Linux keylogger

Build Status

logkeys is a linux keylogger. It is no more advanced than other available linux keyloggers, notably lkl and uberkey, but is a bit newer, more up to date, it doesn't unreliably repeat keys and it shouldn't crash your X. All in all, it just seems to work. It relies on event interface of the Linux input subsystem. Once completely set, it logs all common character and function keys, while also being fully aware of Shift and AltGr key modifiers.

Installation

See INSTALL for installation/build notes.

Usage how-to

Abuse the output of this software wisely.

logkeys is simple. You can either invoke it directly, by typing full command line, or use the provided scripts. There are two helper programs in this package:

  • bin/llk, which is intended to start the logkeys daemon, and
  • bin/llkk, which is intended to kill it.

bin/llk runs etc/logkeys-start.sh, and bin/llkk runs etc/logkeys-kill.sh.

You can use these two setuid root programs (llk and llkk) for starting and stopping the keylogger quickly and covertly. You can modify the .sh scripts as you like. As the two programs are installed with setuid bit set, the root password need not be provided at their runtime.

Default log file is /var/log/logkeys.log and is not readable by others.

I suggest you first test the program manually with

$ touch test.log
$ logkeys --start --output test.log

and in the other terminal follow it with

$ tail --follow test.log

and see if the pressed keys match to those noted. If you use a US keyboard layout, use -u switch. Make sure your terminal character locale is set to UTF-8

$ locale
LANG=xx_YY.UTF-8
LC_CTYPE="xx_YY.UTF-8"
...

or alternatively, you need en_US.UTF-8 locale available on your system

$ locale -a
...
en_US.UTF-8
...

otherwise you may only see odd characters (like ꑶ etc.) when pressing character keys.

logkeys acts as a daemon, and you stop the running logger process with $ logkeys --kill, or use the bin/llkk script.

Documentation

For more information about logkeys log file format, logkeys keymap format, and command line arguments, read the application manual, $ man logkeys, or read the documentation.

Troubleshooting

empty log file or 'Error opening input event device'

After you run logkeys successfully, if you open the log file and see only the 'Logging started...' and 'Logging stopped...' tag without any keypress "contents," it is very likely that logkeys got your device id wrong.

This may also apply if you get the following error: Error opening input event device '/dev/input/event-1'

The solution is to determine the correct event device id, and then run logkeys with --device (-d) switch, specifying that device manually.

The procedure for manually learning the device id to use is as follows:

As root, for each existing device eventX in /dev/input/, where X is a number between 0 and 31 inclusively, write:

$ cat /dev/input/eventX

then type some arbitrary characters. If you see any output, that is the device to be used. If you don't see any output, press Ctrl+C and continue with the next device.

If this happened to be your issue, please submit a bug report, attaching your /proc/bus/input/devices file as well as and specifying which was the correct id.

logkeys outputs wrong characters

It is very likely that you will see only some characters recognized, without any hope for Shift and AltGr working even slightly correct, especially when starting logkeys in X. In that case it is better to switch to virtual terminal, e.g. tty4 (Ctrl+Alt+F4), and there execute:

$ logkeys --export-keymap my_lang.keymap

Then open my_lang.keymap in UTF-8 enabled text editor and manually repair any missing or incorrectly determined mappings. From then on, execute logkeys by

$ logkeys --start --keymap my_lang.keymap

Again, see if it now works correctly (character keys appear correct when you are viewing the log file in editor), and opt to modify bin/llk starter script.

If you create full and completely valid keymap for your particular language, please attach it to a new issue.

Further information

Read the man page. Please read the whole man page. Thanks. :-)

Refer to troubleshooting and FAQ sections in the docs, for currently known issues, ways to resolve them, and any other information.

Report any bugs and request reasonable features on the issues list. When opening new issues, always provide a good summary and description.

Contribute

You are more than welcome to implement unreasonable features yourself, as well as hack the program to your liking.

If you have suggestions, or are a pr0 and can answer any of the questions in the source, please contribute:

  1. Fork this project
  2. Create your feature branch (git checkout -b my-new-feature)
  3. Commit your changes (git commit -am 'Add some feature')
  4. Push to the branch (git push origin my-new-feature)
  5. Create new Pull Request

License

logkeys is dual licensed under the terms of either GNU GPLv3 or later, or WTFPLv2 or later. It is entirely your choice! See COPYING for further information about licensing.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].