{"id":747,"date":"2022-12-14T08:40:10","date_gmt":"2022-12-14T08:40:10","guid":{"rendered":"https:\/\/cybersecuritynest.com\/?p=747"},"modified":"2022-12-14T08:42:20","modified_gmt":"2022-12-14T08:42:20","slug":"undetected-remote-keylogger-for-windows-and-linux","status":"publish","type":"post","link":"https:\/\/cybersecuritynest.com\/?p=747","title":{"rendered":"Undetected remote keylogger for Windows and Linux"},"content":{"rendered":"<aside class=\"mashsb-container mashsb-main mashsb-stretched\"><div class=\"mashsb-box\"><div class=\"mashsb-buttons\"><a class=\"mashicon-facebook mash-large mash-center mashsb-noshadow\" href=\"https:\/\/www.facebook.com\/sharer.php?u=https%3A%2F%2Fcybersecuritynest.com%2F%3Fp%3D747\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Share&nbsp;on&nbsp;Facebook<\/span><\/a><a class=\"mashicon-twitter mash-large mash-center mashsb-noshadow\" href=\"https:\/\/twitter.com\/intent\/tweet?text=&amp;url=https:\/\/cybersecuritynest.com\/?p=747&amp;via=CYBERSECNEST\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Tweet&nbsp;on&nbsp;Twitter<\/span><\/a><a class=\"mashicon-subscribe mash-large mash-center mashsb-noshadow\" href=\"#\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Subscribe&nbsp;to&nbsp;Newsletter<\/span><\/a><div class=\"onoffswitch2 mash-large mashsb-noshadow\" style=\"display:none\"><\/div><\/div>\n            <\/div>\n                <div style=\"clear:both\"><\/div><\/aside>\n            <!-- Share buttons by mashshare.net - Version: 4.0.47--><blockquote class=\"wp-embedded-content\" data-secret=\"O5lVlqbLIU\"><p><a href=\"https:\/\/cybersecuritynest.com\/?page_id=535\">Disclaimer<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Disclaimer&#8221; &#8212; Cyber Security Nest\" src=\"https:\/\/cybersecuritynest.com\/?page_id=535&#038;embed=true#?secret=DySR8294lx#?secret=O5lVlqbLIU\" data-secret=\"O5lVlqbLIU\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h1 dir=\"auto\" align=\"center\"><\/h1>\n<h1 dir=\"auto\" align=\"center\">K\ud83d\udd11Logger v3.0.0<\/h1>\n<h3 dir=\"auto\">Description<\/h3>\n<p dir=\"auto\">Remote persistent\u00a0\ud83d\udd11Logger for Windows and Linux<\/p>\n<h3 dir=\"auto\"><a id=\"user-content-features\" class=\"anchor\" href=\"https:\/\/github.com\/De3vil\/KLogger?fbclid=IwAR0nJmJVdhsP5vliD38c0xO-Vu4xRf1jqt5_Zyu-m4gKTARkCdkYBf43clg#features\" aria-hidden=\"true\"><\/a>Features<\/h3>\n<ul dir=\"auto\">\n<li>Logs keys pressed on keyboard<\/li>\n<li>upload reports in\u00a0<a href=\"https:\/\/anonfiles.com\/\" rel=\"nofollow\">anonfile<\/a>.<\/li>\n<li>Works with Linux and Windows.<\/li>\n<li>Does not require root or admin privlages.<\/li>\n<\/ul>\n<h3 dir=\"auto\"><a id=\"user-content-all-previous-problems-have-been-resolved\" class=\"anchor\" href=\"https:\/\/github.com\/De3vil\/KLogger?fbclid=IwAR0nJmJVdhsP5vliD38c0xO-Vu4xRf1jqt5_Zyu-m4gKTARkCdkYBf43clg#all-previous-problems-have-been-resolved\" aria-hidden=\"true\"><\/a>All previous problems have been resolved<\/h3>\n<h3 dir=\"auto\"><a id=\"user-content-it-is-still-undetectable\" class=\"anchor\" href=\"https:\/\/github.com\/De3vil\/KLogger?fbclid=IwAR0nJmJVdhsP5vliD38c0xO-Vu4xRf1jqt5_Zyu-m4gKTARkCdkYBf43clg#it-is-still-undetectable\" aria-hidden=\"true\"><\/a>It is still undetectable<\/h3>\n<h4 dir=\"auto\"><a id=\"user-content-requirements\" class=\"anchor\" href=\"https:\/\/github.com\/De3vil\/KLogger?fbclid=IwAR0nJmJVdhsP5vliD38c0xO-Vu4xRf1jqt5_Zyu-m4gKTARkCdkYBf43clg#requirements\" aria-hidden=\"true\"><\/a>Requirements<\/h4>\n<ul dir=\"auto\">\n<li>python &gt;= 3.8 ++ Download\u00a0<a href=\"https:\/\/www.python.org\/ftp\/python\/3.8.10\/python-3.8.10-amd64.exe\" rel=\"nofollow\">Python<\/a><\/li>\n<li>os : Windows<\/li>\n<li>os : Linux<\/li>\n<\/ul>\n<h3 dir=\"auto\"><a id=\"user-content-installation-to-windows\" class=\"anchor\" href=\"https:\/\/github.com\/De3vil\/KLogger?fbclid=IwAR0nJmJVdhsP5vliD38c0xO-Vu4xRf1jqt5_Zyu-m4gKTARkCdkYBf43clg#installation-to-windows\" aria-hidden=\"true\"><\/a>Installation to Windows:<\/h3>\n<div class=\"highlight highlight-source-shell notranslate position-relative overflow-auto\" dir=\"auto\">\n<pre>git clone https:\/\/github.com\/De3vil\/KLogger.git\r\n<span class=\"pl-c1\">cd<\/span> KLogger\r\npip install -r win_requirements.txt\r\npython logger.py<\/pre>\n<\/div>\n<h3 dir=\"auto\"><a id=\"user-content-installation-to-linux\" class=\"anchor\" href=\"https:\/\/github.com\/De3vil\/KLogger?fbclid=IwAR0nJmJVdhsP5vliD38c0xO-Vu4xRf1jqt5_Zyu-m4gKTARkCdkYBf43clg#installation-to-linux\" aria-hidden=\"true\"><\/a>Installation to Linux<\/h3>\n<div class=\"highlight highlight-source-shell notranslate position-relative overflow-auto\" dir=\"auto\">\n<pre>git clone https:\/\/github.com\/De3vil\/KLogger.git\r\n<span class=\"pl-c1\">cd<\/span> KLogger\r\nchmod +x linux_setup.sh\r\nbash linux_setup.sh\r\npython logger.py<\/pre>\n<\/div>\n<h3 dir=\"auto\"><a id=\"user-content-warning\" class=\"anchor\" href=\"https:\/\/github.com\/De3vil\/KLogger?fbclid=IwAR0nJmJVdhsP5vliD38c0xO-Vu4xRf1jqt5_Zyu-m4gKTARkCdkYBf43clg#warning\" aria-hidden=\"true\"><\/a>warning:<\/h3>\n<div class=\"highlight highlight-source-shell notranslate position-relative overflow-auto\" dir=\"auto\">\n<pre><span class=\"pl-k\">*<\/span> Don<span class=\"pl-s\"><span class=\"pl-pds\">'<\/span>t Upload in VirusTotal.com Bcz This tool will not work with Time.<\/span>\r\n<span class=\"pl-s\">* Virustotal Share Signatures With AV Comapnies.<\/span>\r\n<span class=\"pl-s\">* Again Don<span class=\"pl-pds\">'<\/span><\/span>t be an Idiot<span class=\"pl-k\">!<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-748\" src=\"https:\/\/cybersecuritynest.com\/wp-content\/uploads\/2022\/12\/AV-300x263.png\" alt=\"\" width=\"300\" height=\"263\" srcset=\"https:\/\/cybersecuritynest.com\/wp-content\/uploads\/2022\/12\/AV-300x263.png 300w, https:\/\/cybersecuritynest.com\/wp-content\/uploads\/2022\/12\/AV-768x674.png 768w, https:\/\/cybersecuritynest.com\/wp-content\/uploads\/2022\/12\/AV.png 992w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/span><\/pre>\n<\/div>\n<aside class=\"mashsb-container mashsb-main mashsb-stretched\"><div class=\"mashsb-box\"><div class=\"mashsb-buttons\"><a class=\"mashicon-facebook mash-large mash-center mashsb-noshadow\" href=\"https:\/\/www.facebook.com\/sharer.php?u=https%3A%2F%2Fcybersecuritynest.com%2F%3Fp%3D747\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Share&nbsp;on&nbsp;Facebook<\/span><\/a><a class=\"mashicon-twitter mash-large mash-center mashsb-noshadow\" href=\"https:\/\/twitter.com\/intent\/tweet?text=&amp;url=https:\/\/cybersecuritynest.com\/?p=747&amp;via=CYBERSECNEST\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Tweet&nbsp;on&nbsp;Twitter<\/span><\/a><a class=\"mashicon-subscribe mash-large mash-center mashsb-noshadow\" href=\"#\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Subscribe&nbsp;to&nbsp;Newsletter<\/span><\/a><div class=\"onoffswitch2 mash-large mashsb-noshadow\" style=\"display:none\"><\/div><\/div>\n            <\/div>\n                <div style=\"clear:both\"><\/div><\/aside>\n            <!-- Share buttons by mashshare.net - Version: 4.0.47-->","protected":false},"excerpt":{"rendered":"<p>K\ud83d\udd11Logger v3.0.0 Description Remote persistent\u00a0\ud83d\udd11Logger for Windows and Linux Features Logs keys pressed on keyboard upload reports in\u00a0anonfile. Works with Linux and Windows. Does not require root or admin privlages. All previous problems have been resolved It is still undetectable Requirements python &gt;= 3.8 ++ Download\u00a0Python os : Windows os : Linux Installation to Windows: [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":749,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[8],"tags":[],"class_list":["post-747","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ethical-hacking"],"aioseo_notices":[],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/posts\/747"}],"collection":[{"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=747"}],"version-history":[{"count":3,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/posts\/747\/revisions"}],"predecessor-version":[{"id":753,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/posts\/747\/revisions\/753"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/media\/749"}],"wp:attachment":[{"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=747"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=747"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=747"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}