You can register an iTabCode account to be able to view iTabCode without ads. ( Registration is Free ) Register Now

keylogger

  1. x32x01

    Use Keylogger in Metasploit Framework

    Sometimes a penetration tester may have remote access to a user’s machine, but he may not have the user’s password. Maybe the user has a very long complex password that would just take too long to crack. What could he do? Meterpreter in the Metasploit Framework has a great utility for capturing...
  2. x32x01

    How hackers hack Facebook Accounts & How to prevent them?

    Facebook is, undoubtedly, the most popular social networking website with more than 500 million active users. Due to its popularity, many bad guys (black hackers) are actively involved in hacking Facebook accounts of unsuspecting users. Most people may ask why hackers hack Facebook accounts...
  3. x32x01

    How to create a keylogger in PowerShell ?

    The creation of a keylogger in PowerShell during the development of a Tarlogic Red Team exercise was necessary. And given the specific condition of the scenario, the best resulting option was programming a small script in PowerShell in order to save and exfiltrate keystrokes. Please, find in...
  4. x32x01

    How to Make a Keylogger in Python + Code

    Creating and implementing a keylogger from scratch that records key strokes from keyboard and send them to email or save them as log files using Python and keyboard library. A keylogger is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer's...
Top