Home
Forums
New posts
Search forums
What's new
New posts
New profile posts
Latest activity
Members
Current visitors
New profile posts
Search profile posts
Log in
Register
What's new
Search
Search
Search titles only
By:
New posts
Search forums
Menu
Log in
Register
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Home
Forums
CARDING & HACKING
Hacking Tools
How to create a keylogger for Chrome browser on Linux
Message
<blockquote data-quote="Dr. Smile" data-source="post: 393" data-attributes="member: 19"><p>Many associate such programs with illegal activities and malware. Despite the fact that keyloggers can be viewed as an invasion of privacy, it still does not violate the law in any way. Parents, for example, can acquire such software to protect their children on the Internet - and find out who they communicate with on Facebook or Whatsapp. The app tracks data on PC, Mac, iPhone and other devices.</p><p></p><p>The employer, in turn, can draw a conclusion about what his employees are doing during work. The system provides detailed online reports on staff productivity.</p><p></p><p>Another possible use of a keylogger is to protect privacy settings, passwords and data that may be lost due to bugs in the computer. But, on the other hand, an attacker using a keylogger can gain access to private and confidential information, which, of course, is prohibited by law.</p><p></p><p><strong>What it is</strong></p><p>Keylogger is a type of software that is used to track or log all keystrokes on the keyboard. The user of an electronic device may not even suspect that any clicks and presses are recorded, and the keylogger remembers absolutely everything - up to correspondence in social networks and chats. The presence of such a program is almost impossible to notice, since it functions in the background as an integral part of the operating system.</p><p></p><p>In this post, we will talk about one interesting utility Hera, with its help you can easily create your own keylogger for the Chrome browser, which in turn will send you all the information entered by the victim.</p><p></p><p>The use of keyloggers is especially important in many areas of government agencies, because it is in this area that the task of having secret data and keeping it secret by employees who have access to them is urgent. At the same time, a keylogger will not be superfluous on a PC in a large company or firm, because they also have information that may be of interest, for example, to competitors.</p><p></p><p><strong>Installation:</strong></p><p>Code:</p><p>git clone <a href="https://github.com/UndeadSec/HeraKeylogger" target="_blank">https://github.com/UndeadSec/HeraKeylogger</a></p><p>cd HeraKeylogger</p><p>sudo apt-get install python3-pip -y</p><p>sudo pip3 install -r requirements.txt</p><p></p><p><strong>Usage:</strong></p><p>Code:</p><p>python3 hera.py</p><p></p><p>The created keylogger will be in the utility folder called “MaliciousExtension”. You need to install it in the victim's browser, then it will send you all keystrokes.</p><p></p><p><strong>CHECKED ON:</strong></p><ul> <li data-xf-list-type="ul"><strong>Kali Linux - Rolling Edition</strong></li> <li data-xf-list-type="ul"><strong>Linux Mint - 18.3 Sylvia</strong></li> <li data-xf-list-type="ul"><strong>Ubuntu - 16.04.3 LTS</strong></li> <li data-xf-list-type="ul"><strong>MacOS High Sierra</strong></li> </ul><p></p><p>Keyloggers work equally well on both Windows and Linux operating systems. There are no differences in the functionality and operation of this tool when it is run on different operating systems. After installing the keylogger:</p><ul> <li data-xf-list-type="ul">automatically starts when the operating system starts;</li> <li data-xf-list-type="ul">works imperceptibly for the user himself;</li> <li data-xf-list-type="ul">to record all actions carried out by the user through the keyboard - any keystrokes and actions that follow him - are recorded and recorded;</li> <li data-xf-list-type="ul">monitor the installation, frequency and duration of application use;</li> <li data-xf-list-type="ul">the report document can be viewed either under your account, or on any other device.</li> </ul><p>Installing a keylogger is a great way to secure important information by protecting it from unauthorized access by third parties, spy "attacks" or transmission to competitors.</p><p></p><p><strong>Screenshot:</strong></p></blockquote><p></p>
[QUOTE="Dr. Smile, post: 393, member: 19"] Many associate such programs with illegal activities and malware. Despite the fact that keyloggers can be viewed as an invasion of privacy, it still does not violate the law in any way. Parents, for example, can acquire such software to protect their children on the Internet - and find out who they communicate with on Facebook or Whatsapp. The app tracks data on PC, Mac, iPhone and other devices. The employer, in turn, can draw a conclusion about what his employees are doing during work. The system provides detailed online reports on staff productivity. Another possible use of a keylogger is to protect privacy settings, passwords and data that may be lost due to bugs in the computer. But, on the other hand, an attacker using a keylogger can gain access to private and confidential information, which, of course, is prohibited by law. [B]What it is[/B] Keylogger is a type of software that is used to track or log all keystrokes on the keyboard. The user of an electronic device may not even suspect that any clicks and presses are recorded, and the keylogger remembers absolutely everything - up to correspondence in social networks and chats. The presence of such a program is almost impossible to notice, since it functions in the background as an integral part of the operating system. In this post, we will talk about one interesting utility Hera, with its help you can easily create your own keylogger for the Chrome browser, which in turn will send you all the information entered by the victim. The use of keyloggers is especially important in many areas of government agencies, because it is in this area that the task of having secret data and keeping it secret by employees who have access to them is urgent. At the same time, a keylogger will not be superfluous on a PC in a large company or firm, because they also have information that may be of interest, for example, to competitors. [B]Installation:[/B] Code: git clone [URL]https://github.com/UndeadSec/HeraKeylogger[/URL] cd HeraKeylogger sudo apt-get install python3-pip -y sudo pip3 install -r requirements.txt [B]Usage:[/B] Code: python3 hera.py The created keylogger will be in the utility folder called “MaliciousExtension”. You need to install it in the victim's browser, then it will send you all keystrokes. [B]CHECKED ON:[/B] [LIST] [*][B]Kali Linux - Rolling Edition[/B] [*][B]Linux Mint - 18.3 Sylvia[/B] [*][B]Ubuntu - 16.04.3 LTS[/B] [*][B]MacOS High Sierra[/B] [/LIST] Keyloggers work equally well on both Windows and Linux operating systems. There are no differences in the functionality and operation of this tool when it is run on different operating systems. After installing the keylogger: [LIST] [*]automatically starts when the operating system starts; [*]works imperceptibly for the user himself; [*]to record all actions carried out by the user through the keyboard - any keystrokes and actions that follow him - are recorded and recorded; [*]monitor the installation, frequency and duration of application use; [*]the report document can be viewed either under your account, or on any other device. [/LIST] Installing a keylogger is a great way to secure important information by protecting it from unauthorized access by third parties, spy "attacks" or transmission to competitors. [B]Screenshot:[/B] [/QUOTE]
Name
Verification
Post reply
Home
Forums
CARDING & HACKING
Hacking Tools
How to create a keylogger for Chrome browser on Linux
Top