There are numerous keyloggers written in C++ that are available within the Open Source community, as to strengthen more and take a deeper dive into what capabilities of a keylogger can benefit a Red Teamer and potentially has been used by other APT groups (Advanced Persistent Threat groups). This implementation incorporates advanced memory manipulation, obfuscation techniques, and secure data transmisison, pushing the regular boundaries of what such tools can achieve.
Important:
This project is intended for educational and research purposes only. The author does not condone or support illegal or unethical use of this software.
- Logging keystrokes into a pre-defined memory region instead of writing them to a file, enabling the program to function solely within memory.
- Reading keystrokes from memory and disguising them as IPv4 addresses.
- Periodically sending keystrokes from the written memory region back to the attacker’s server within a specific time frame to divert suspicion.
CMake
,libcurl
.
- Clone the repository:
git clone https://github.com/LeshenkaZevnoski/ObfuscatedKeylogger.git cd ObfuscatedKeylogger
- Create a build directory
mkdir build cd build
- Build the project
cmake --build
The compiled executable will be located in:
/Release/x64/Release/ObfuscatedKeylogger.exe