Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      Anonymous Keylogger

      Recommended Posts

      Staff

      Hidden Content

        Give reaction to this post to see the hidden content.

       

      Download:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Password:

      level23hacktools.com

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Best Free Keylogger Pro – is a solution to monitor what your children or employees are doing on their computer.
          Features
          • Record Keystrokes
          • Monitor Clipboard
          • Capture Screenshots
          • Monitor Internet Activities
          • Monitor Local Applications
          • “Smart Read” Filter
          • Advanced Filtering
          • HTML Reports
          • Limit by User/Application
          • Scheduled Monitoring
          • Encrypted Log Files
          • Password Protection
          • Delivery via Email, FTP, LAN, USB
          • Automatic Log Clearance
          • Invisible Mode
          • Automatic Uninstallation
          • Parental Controls
          • Web Filtering
          • Time Limiting Internet Access
          • Internet Blocking
          • Application Blocking
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. A keylogger written in python

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. This program is a browser extension that can perform targeted keylogging on certain sites, as well as general keylogging.
          By default, inside the "manifest.json" file, the "matches" key (inside of "content_scripts") is set to "<all_urls>" ... this, however, can be changed to any URL.
          For example, putting in "*://roblox.com/login" instead of "<all_urls>" will only target that site.
          Furthermore, the script execution can be changed to a background process for general keylogging, which will allow the script to collect keys even when not on a specific URL.
          This is not necessary, and is probably more likely to increase "spam" text, but it will not delete unsent text when going to a new URL.
          Overall, the more you decrease the send time (down to 1), the more text the program will grab per site.  It will be messy and not well formatted, however.
          Bot names are random numbers between 0 and 1, and keep track of users on a site (standard) or stay constant for an entire user session (background process).
          The visible function of the extension will reside in "popup.html" and this file can be changed to create better trojans.
          Only use this for testing purposes.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. TechNowLogger is Keylogger Generator for Windows/Linux, which sends key-logs & screenshot via email with other juicy target info written in Python 3.
          Features
              Works on Windows/Linux
              Notify New Victim Via Email
              Undetectable
              Persistence
              Sends Screenshot of Victim PC's Screen via email
              Creates Executable Binary With Zero Dependencies
              Create less size ~ 5mb payload with advance functionality
              Obfusticate the Payload before Generating it, hence Bypassing few more antivirus
              Generated Payload is Encryted with base64, hence makes extremely difficult to reverse engineer the payload
              Function to Kill Antivirus on Victim PC and tries to disable the security
              Awesome Colourful Interface to generate payload
              On Attacker Side: While Creating Payload, Script Automatically Detects Missing Dependencies & Installs Them
              Distinguish Log Data on the Basics of Active Window Name (Check v1.3 Image for Better Understanding)
              Able to add custom Icon to evil file (New Argument is Added in v1.3 & onward version)
              Built-in Binder which can bind Keylogger to Any File [.pdf, .txt, .exe etc], Running legitimate file on front end & evil codes in back-end as a service. (New Argument is Added in v1.4 & onward version)
              Checks for Already Running Instance on System, If running instance found, then only legitimate file is executed [Multiple Instance Prohibiter to avoid Same Muliple Logs Email].
              Attacker can Create/Compile for Both Windows/Linux OS Using Linux System, But Can only Create/Compile Windows Executable using Windows Machine
              Retrieves Saved Passwords from victim System and sends it to Attacker.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. [Solo para programadores] Troyano espía | Keylogger solo para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. | Envío de registro mediante [Base de Datos], [Gmail] o [BotTelegram].
          Nota importante !
          Ésta herramienta tiene como único proposito general, el aprendizaje de "Seguridad en sistemas informáticos", el creador no se hace responsable por un posible mal uso de ésta herramienta.

          Hidden Content
          Give reaction to this post to see the hidden content.