nascompany.blogg.se

Best windows logger
Best windows logger






  1. #Best windows logger how to#
  2. #Best windows logger install#
  3. #Best windows logger generator#
  4. #Best windows logger update#

Retrives & Sends Saved Chrome Browser's Password Log Data is Distinguished on The Basics of Active Window Name ~ Feature Added to v1.3 & Onward Password for the email address given in the -e argument. Note : Either -w/-windows or -l/-linux must be specified Payload Will Run In Foreground with CMD Window, To get Appropriate Execution Error Steal Saved Password from Victim Machine ĪutoBinder : Specify Path of Legitimate file. default=120īecoming Persistence After _ seconds. Note:- Evil File will be saved inside dist/ folder, inside technowlogger/ folder Available Arguments

  • Note: Git Must be Installed in order to use updater.py.
  • #Best windows logger update#

    Run updater.py to Update Autmatically or Download the latest Zip from this GitHub repo.

    #Best windows logger how to#

    Note: You can also use our custom icons from the icon folder, just use them like this -icon icon/pdf.ico How to Update $ python technowgen.py -e -p YourEmailPass -w -o output_file_name -icon icon_path # Open technowgen.py in Text editor and Configure Line 16 WINDOWS_PYTHON_PYINSTALLER_PATH = "C:/Python37-32/Scripts/pyinstaller.exe" # Getting Help Menu

    #Best windows logger install#

    $ python -m pip install -r requirements.txt If your payload is unable to execute, then specify -debug to run exe on foreground with CMD.Grabs & Send Useful Information of Victim's Device.Note: Custom Stealer is Coded, does not relies on LaZagne Retrieves Saved Passwords from victim System and sends it to Attacker.īuilt-in Stealer Can Steal These Things :Ĭhrome Cookies (Login Data, Cookies, History).

    best windows logger

  • Attacker can Create/Compile for Both Windows/Linux OS Using Linux System, But Can only Create/Compile Windows Executable using Windows Machine.
  • Checks for Already Running Instance on System, If running instance found, then only legitimate file is executed.
  • (New Argument is Added in v1.4 & onward version)
  • Built-in Binder which can bind Keylogger to Any File, Running legitimate file on front end & evil codes in back-end as a service.
  • Able to add custom Icon to evil file (New Argument is Added in v1.3 & onward version).
  • Distinguish Log Data on the Basics of Active Window Name (Check v1.3 Image for Better Understanding).
  • On Attacker Side: While Creating Payload, Script Automatically Detects Missing Dependencies & Installs Them.
  • Awesome Colourful Interface to generate payload.
  • best windows logger

  • Function to Kill Antivirus on Victim PC and tries to disable the security.
  • Generated Payload is Encryted with base64, hence makes extremely difficult to reverse engineer the payload.
  • best windows logger

  • Obfusticate the Payload before Generating it, hence Bypassing few more antivirus.
  • Create less size ~ 5mb payload with advance functionality.
  • Creates Executable Binary With Zero Dependencies.
  • best windows logger

  • Sends Screenshot of Victim PC's Screen via email.
  • THE DEVELOPERS ASSUME NO LIABILITY AND ARE NOT RESPONSIBLE FOR ANY MISUSE OR DAMAGE CAUSED BY THIS PROGRAM. THE USE IS COMPLETE RESPONSIBILITY OF THE END-USER. YOU MAY USE THIS SOFTWARE AT YOUR OWN RISK. THIS SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. 💻 This project was created only for good purposes and personal use.

    #Best windows logger generator#

    TechNowLogger is Keylogger Generator for Windows/Linux, which sends key-logs & screenshot via email with other juicy target info written in Python 3. This small python script can do really awesome work.








    Best windows logger