• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Phyton TechNowLogger - Keylogger Generator v1.8

Status
Not open for further replies.

itsMe

*KillmeMories*
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Jan 8, 2019
Messages
56,623
Solutions
2
Reputation
32
Reaction score
100,456
Points
2,313
Credits
32,750
‎6 Years of Service‎
 
76%
1.version_1.3.PNG


TechNowLogger is Keylogger Generator for Windows/Linux, which sends key-logs & screenshot via email with other juicy target info written in Python 3.

Features

    Works on Windows/Linux
    Notify New Victim Via Email
    Undetectable
    Persistence
    Sends Screenshot of Victim PC's Screen via email
    Creates Executable Binary With Zero Dependencies
    Create less size ~ 5mb payload with advance functionality
    Obfusticate the Payload before Generating it, hence Bypassing few more antivirus
    Generated Payload is Encryted with base64, hence makes extremely difficult to reverse engineer the payload
    Function to Kill Antivirus on Victim PC and tries to disable the security
    Awesome Colourful Interface to generate payload
    On Attacker Side: While Creating Payload, Script Automatically Detects Missing Dependencies & Installs Them
    Distinguish Log Data on the Basics of Active Window Name (Check v1.3 Image for Better Understanding)
    Able to add custom Icon to evil file (New Argument is Added in v1.3 & onward version)
    Built-in Binder which can bind Keylogger to Any File [.pdf, .txt, .exe etc], Running legitimate file on front end & evil codes in back-end as a service. (New Argument is Added in v1.4 & onward version)
    Checks for Already Running Instance on System, If running instance found, then only legitimate file is executed [Multiple Instance Prohibiter to avoid Same Muliple Logs Email].
    Attacker can Create/Compile for Both Windows/Linux OS Using Linux System, But Can only Create/Compile Windows Executable using Windows Machine
    Retrieves Saved Passwords from victim System and sends it to Attacker.

To see this hidden content, you must like this content.
 
Status
Not open for further replies.
Back
Top