Skip to content

A creative way to evade 'Real time protection' and Windows Firewall on windows, and obtain victim key-strokes by obfuscate keylogger and using nc on remote machine.

License

Notifications You must be signed in to change notification settings

Adkali/SockLogger

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

20 Commits
 
 
 
 
 
 
 
 

Repository files navigation

SockLogger

A NICE-creative way to evade 'Real Time Protection' and 'Windows Firewall' on windows OS, and obtain victim's key-strokes. You can obfuscate the code and do with it whatever you wish. using 'nc' on remote machine while Python on the background, you're provided with the victim's key-storkes including directory listing on the system32 as the script runs with administrator privilege. While i was looking for a way to make a simple keylogger, i tought it would be interesting to make a keylogger which will executed upon a running .ps1(PowerShell Script) with a fake message saying something about critical problems that must be handle right now using Windows Update. Started to make a script that will make 3 things. anyway, it must! first run as Administrator privilege.

What It DoEs?:

  1. Turn off the Windows Firewall Real Time Protection.
  2. enject a malicious DWORD on the registry which will make the real time protection going down. ( Be Aware!! )
  3. Disable the real time protection.
  4. When the the pp.pyw gets execute [ Using .pyw for making it run in the background ], it's send the keystrokes of the victim to a remote machine [ Attacker ] on the other side by using the next command for listening in a loop: 'while true; do nc -lvnp [PORT]; done' [ in my case is PORT 8080 ].
  5. Open a python web server for "C:\Windows\System32" if it worth something ...

2

Usage

  • I made a test on my local windows 11 x64-Based PC machine [ VICTIM ].
1. git clone the reposotory.
2. cd SockLogger.
3. open a new terminal, press Ctrl+Shift+R and and terminal will split into two windows.
4. On window number 1 with the help of using a python, open a server to your local machine on the SockLogger folder.
5. On window number 2, use the on-top-command i wrote for a loop over and over.
6. Download the script on the victim machine [ Real time protection 'ON' || Windows Firewall 'ON' ]
7. after run it, wait for powershell window to gone. try typing something and head over to the attacker machine.
8. On window number 2, you should see the keystrokes you made [ On victim machine ]

3

4

Updates

This code is just a test while trying for a ways of not only using obfuscation ways, but also using a creative ways of bypass the windows defender/real time protection. still, i want to make a better code which not only contain a phishing message, but also a one that will actually restart the victim's computer, and when it load's again, the script will make another things reffers to protection and bypassing it.

Note

Change Machine IP in the .ps1/pyw script.

in my case, the .ps1 is 10.0.0.40 on port 80, and the listener was on port 8080. please, if you are having any problems, i would like to know. soon i will make a python script which will execute it all in one code. please notice that the .pyw script {python} saved at 'C:\Users\public' directory

Requirements

Victim must have python installed on computer(python3). When script gets executed, it will install using pip the 'pynput' package.

About

A creative way to evade 'Real time protection' and Windows Firewall on windows, and obtain victim key-strokes by obfuscate keylogger and using nc on remote machine.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published