0% found this document useful (0 votes)
4 views1 page

User Guide

This user guide outlines the features and setup process for an advanced keylogger, which includes keystroke capture, microphone recording, clipboard data acquisition, system information collection, live screenshot capture, and file encryption. It provides step-by-step instructions for generating an encryption key, configuring email settings, and preparing the file structure for successful execution. The keylogger uses Fernet encryption for securing sensitive data before sending it to the attacker's email address.

Uploaded by

Sameer Najam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views1 page

User Guide

This user guide outlines the features and setup process for an advanced keylogger, which includes keystroke capture, microphone recording, clipboard data acquisition, system information collection, live screenshot capture, and file encryption. It provides step-by-step instructions for generating an encryption key, configuring email settings, and preparing the file structure for successful execution. The keylogger uses Fernet encryption for securing sensitive data before sending it to the attacker's email address.

Uploaded by

Sameer Najam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

User Guide

#Features of my advanced keylogger :

1 > Capturing keystrokes & creating a text file.

2 > Recording microphone data for a specific period of time.

3 > Acquring clipboard information & creating a text file.

4 > Acquring system information & text file.

5 > Capturing live screenshots during execution.

6 > Sending all these files over ot attacker's email address.

7 > Encrypting keystrokes text file, clipboard information text file, system infomartion text file using
Fernet encryption algorithm.

8 > Decrypting the above whenever needed using the same decryption algorithm.

#Steps to follow for successful execution of my keylogger.

1 > execute the GenerateKey.py file and it will generate an encryption key

2 > copy that key from the file and paste it into keyLogger.py and DecryptFiles.py at a specified
location (mentioned in comments)

3 > set the sender email id and password and the receievr email id in the KeyLogger.py file (in
specified locations, mentioned in comments)

5 > create a new folder "Saved Logs" and copy the folder path and paste it into the keylogger.py
and DecryptFiles.py at specified location(in specified location as mentioned in comments)

6 > save all the files before final execution

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy