What is a keylogger?
A keylogger is an insidious form of spyware. You enter sensitive data onto your keyboard, believing nobody is watching. In fact, keylogging software is hard at work logging everything that you type.
Keyloggers are activity-monitoring software programs that give hackers access to your personal data. The passwords and credit card numbers you type, the webpages you visit — all by logging your keyboard strokes. The software is installed on your computer, and records everything you type. Then it sends this log file to a server, where cybercriminals wait to make use of all this sensitive information.
Attention! All information is provided for informational and educational purposes only. The author is not responsible for any possible harm caused by the materials of this article.
Beelogeer is an open source electronic keylogger. Have you ever wondered how to get someone’s credentials that are outside of your network that you cannot hack simply by using a payload and listener? Then the only method that remains to spy on his / her credentials is to install a keylogger and most keyloggers available online for remote keylogging are paid for. However, you can create an electronic keylogger with Beelogger for free if you have a Linux or Mac OS system.
We are going to use a powerful tool known as beelogger which will possibly generate fake Adobe Flash update, fake Word document, fake pdf, fake pptx, which are basically Windows keyloggers.
This tool gives extra energy to the subject of social engineering. We all run into problems when we try to install the keylogger on other computers because they know about exe format files and that they do not want to put unknown files in this style, however, if we send them a text document file or PDF file, then there is a good one. chance to click on it.
Functions
Send clicks every 120 seconds.
Send clicks if characters> 50.
Send clicks with GMAIL.
Some phishing techniques included.
Multiple session disconnected.
Auto-constancy.
It can create many types of keyloggers, for example:
Adobe Flash update installation file.
Adobe PDF
Office Word
PowerPoint PPTX
Excel sheet
Empty executable
Installation and launch:
git clone https://github.com/4w4k3/BeeLogger.git
cd BeeLogger
./install.sh
./bee.py
Using:
We generate it for the parameters:
Great, the malware survived:
Antiviruses almost did not harm him
Create a malicious keylogger plugin for Google Chrome
Hera is a utility that allows you to create a keylogger that works as an extension in the Google Chrome browser.
Installation on Linux
$ git clone https://github.com/UndeadSec/HeraKeylogger
$ cd HeraKeylogger
$ sudo apt-get install python3-pip -y
$ sudo pip3 install -r requirements.txt
$ start https://t.me/hackingtipp
Launch
$ python3 hera.py
The extension will be created and saved in the "MaliciousExtension" folder. It must be installed manually in the victim's browser. Once installed, all keystrokes and websites visited will be stored in your log.txt file.
Thank you all for your attention!