0% found this document useful (0 votes)
10 views11 pages

Keylogger

The document outlines a project by Vivek Kumar Sahu, a student at Technocrats Institute of Technology, focusing on developing a keylogger application with a GUI using Python for cybersecurity purposes. It includes details about the project agenda, implementation guide, ethical considerations, and potential end users, emphasizing the importance of responsible use. The keylogger aims to enhance security and compliance while providing educational opportunities in programming and software development.

Uploaded by

Vivek Sahu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views11 pages

Keylogger

The document outlines a project by Vivek Kumar Sahu, a student at Technocrats Institute of Technology, focusing on developing a keylogger application with a GUI using Python for cybersecurity purposes. It includes details about the project agenda, implementation guide, ethical considerations, and potential end users, emphasizing the importance of responsible use. The keylogger aims to enhance security and compliance while providing educational opportunities in programming and software development.

Uploaded by

Vivek Sahu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

STUDENT DETAILS

Name : VIVEK KUMAR SAHU


SkillsBuild Email ID : viveksahu1006@gmail.com
College Details : Technocrats Institute of
Technology(Excellence), Bhopal
College State : Madhya Pradesh
Internship Domain : Cyber Security
Internship Start and End Date : 14/06/2023 to 24/07/2023
PROBLEM
STATEMENT
KEYLOGGER-CAPTURING KEY
STROKES

Develop a keylogger application with


a graphical user interface (GUI) using
Python. The main purpose of a
keylogger is to covertly capture the
user's keyboard inputs without their
knowledge or consent. This collected
data can then be accessed and
analyzed by malicious actors or
authorized entities for various
purposes..
AGENDA

1.Introduction and Setup


2.Project Overview
3.Keylogging Functionality
4.Solution and its Value Proposition
5.Implementation Guide
6.Modelling
7.Testing
8.Results
9.Links
File Handling and User Input:
 Prompt the user to enter the name of the text
file where the recorded keystrokes will be
stored.
 Implement the file handling mechanism to write
Introduction and Setup:
the captured keystrokes to the specified text
• Introduce the project and its purpose. file.
• Explain the setup process, including the
required Python libraries and dependencies. Implementation Guide:
 Provide a step-by-step guide on implementing

GUI Design: the keylogger application with a GUI.

PROJECT
 Explain the code structure and logic behind
• Design a graphical user interface (GUI) for the
keylogging and file handling.
keylogger application.

OVERVIEW • Include user-friendly controls, such as buttons


for starting and stopping the keylogger. Testing and Verification:
 Conduct thorough testing to ensure the proper
functioning of the keylogger and GUI.
Keylogging Functionality:  Verify that the captured keystrokes are
• Implement the keylogging functionality to correctly written to the specified text file.
capture all keystrokes made by the user.

• Ensure that the keylogger records Ethical and Legal Considerations:


alphanumeric characters, special characters.  Highlight the importance of ethical use of the
keylogger application.
 Discuss the legal considerations, such as
obtaining appropriate permissions and
informing users about the presence of the
keylogger
 Respecting privacy and seeking proper
authorization before using monitoring or
surveillance software is essential for ethical
behavior.
 Educational institutions incorporating the project
as a practical exercise in programming,
cybersecurity, or ethical hacking courses.
WHO ARE
THE END  Employers monitoring employee computer
activity to ensure productivity and security.
USERS
 Researchers studying human-computer
interaction, behavior analysis, or related fields
that require keystroke data for their studies.

 System administrators using the keylogger for


monitoring and troubleshooting purposes within
their organizations
YOUR SOLUTION AND ITS VALUE
PROPOSITION
Keylogger can be used for various purposes, including cybersecurity ,digital
forensics and system monitoring.
Users can specify the name of the text file to store the recorded keystrokes. The
benefits include:

 Simplicity: A straightforward and intuitive interface makes it easy for


authorized users to manage the keylogger efficiently.

 Customization: Allowing users to specify the output file name enables


personalization and flexibility according to their preferences.

 Learning Opportunities: Developing this keylogger project can provide


valuable educational experiences in programming, software development, and
cybersecurity.

 Enhanced Security and Compliance: When used ethically and legally, this
keylogger can bolster security measures and assist organizations in
complying with relevant regulations and policies.

 Monitoring Capabilities: In authorized scenarios, this keylogger can be a


valuable tool for monitoring computer activity to ensure productivity, safety, or
for troubleshooting purposes.
HOW DID YOU CUSTOMIZE THE PROJECT
AND MAKE IT YOUR OWN
• Record keystroke activity
• Record any website visited as wall as snapshots of the website.
• Logs around instant message and emails send or received.
• Applications opened by the user in a certain period of time
• One of the key features that sets my project apart is customization. Users can specify the
name of the text file where the recorded keystrokes will be stored, offering a personalized
experience.
• By prioritizing usability, customization, ethics, and education, my keylogger project
distinguishes itself from typical professional keyloggers. It aims to empower users while
fostering a responsible and informed approach to cybersecurity and software development.
MODELLING
Captured Keystrokes: The keylogger would record and store

RESULTS the keystrokes made by users on the targeted computer or


device. This information could include text inputs, passwords,
Here’s the link to the Project Code commands, and other keyboard-based actions. Data Logging:
and the Results file The keylogger would create logs or records of the captured
keystrokes, typically organized by time and user activity.
<KeyLogger
/keylogger.txt at main · viveksahu06/ These logs may contain timestamps, application or website
KeyLogger (github.com)> names, and other contextual information.
LINKS

https://skillsbuild.edunetworld.com/courses/cs/keylogger-capt

uring-key-strokes/

https://github.com/viveksahu06/KeyLogger

 https://skills.yourlearning.ibm.com/activity/PLAN-F08B0E84F0B3

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy