How to create a simple keylogger using python with logger

preview_player
Показать описание
How to create a simple keylogger using python using logger - A simple tutorial based on how to use python modules such as logger and keynput to create a keylogger. This keylogger can be used in the background to capture all the keylogs into a text file which can later be viewed.

What is keylogger?

The term ‘keylogger’ itself is neutral, and the word describes the program’s function. Most sources define a keylogger as a software program designed to secretly monitor and log all keystrokes. This definition is not altogether correct, since a keylogger doesn’t have to be software – it can also be a device. Keylogging devices are much rarer than keylogging software, but it is important to keep their existence in mind when thinking about information security.

Legitimate programs may have a keylogging function which can be used to call certain program functions using “hotkeys,” or to toggle between keyboard layouts (e.g. Keyboard Ninja). There is a lot of legitimate software which is designed to allow administrators to track what employees do throughout the day, or to allow users to track the activity of third parties on their computers. However, the ethical boundary between justified monitoring and espionage is a fine line. Legitimate software is often used deliberately to steal confidential user information such as passwords.

Most modern keyloggers are considered to be legitimate software or hardware and are sold on the open market. Developers and vendors offer a long list of cases in which it would be legal and appropriate to use keyloggers, including:

Parental control: parents can track what their children do on the Internet, and can opt to be notified if there are any attempts to access websites containing adult or otherwise inappropriate content;
Jealous spouses or partners can use a keylogger to track the actions of their better half on the Internet if they suspect them of “virtual cheating”;
Company security: tracking the use of computers for non-work-related purposes, or the use of workstations after hours;
Company security: using keyloggers to track the input of key words and phrases associated with commercial information which could damage the company (materially or otherwise) if disclosed;
Other security (e.g. law enforcement): using keylogger records to analyze and track incidents linked to the use of personal computers;
Other reasons.
However, the justifications listed above are more subjective than objective; the situations can all be resolved using other methods. Additionally, any legitimate keylogging program can still be used with malicious or criminal intent. Today, keyloggers are mainly used to steal user data relating to various online payment systems, and virus writers are constantly writing new keylogger Trojans for this very purpose.
Рекомендации по теме
Комментарии
Автор

Wow amazing this guys an absolute legend please make more video like this

stevenlewin
Автор

how to send that to the taget person and receive the file in my mail box i

LogyTech
Автор

i have write such a python program that use lazagne .which automatically run program on victim computer and the send file to my mail box but am facing some errors. can u help me>? send me your email we will discuss .

LogyTech