Created for Educational and Ethical Testing Purposes
Β© 2026 Educational Security Tools. All rights reserved.
π¨ This project is STRICTLY for educational and ethical testing purposes only.
Unauthorized use is illegal and unethical.
βοΈ IMPORTANT LEGAL NOTICE:
- DO NOT use this software to monitor anyone without their explicit consent.
- The author assumes NO responsibility for misuse or damages.
- By using this tool, you agree to use it only for educational purposes on systems you own or have written permission to test.
- Unauthorized keylogging may be illegal in your jurisdiction.
- Check local laws and regulations before use.
π‘οΈ Ethical Guidelines:
- Always obtain written permission before testing.
- Never use for malicious or unauthorized purposes.
- Keep logs secure and delete after testing.
- Respect privacy and comply with all data protection laws.
- Use in a controlled environment when possible.
This is an intermediate-level Python keylogger designed to demonstrate various system monitoring techniques for educational purposes. It serves as a learning tool for understanding cybersecurity concepts and system interaction programming.
π Monitoring Capabilities:
- β¨οΈ Keyboard Input Logging β Capture and log keystrokes
- πΌοΈ Screenshot Capture β Automatic screen capture at intervals
- π€ Audio Recording β Record system audio for analysis
- π Clipboard Monitoring β Track clipboard content changes
- π» System Information Collection β Gather system details
- πΆ WiFi Password Extraction β Retrieve saved WiFi credentials
β‘ Technical Features:
- Multi-threaded operation for efficiency
- Automatic dependency installation
- Clean file organization
- Error handling and logging
- Configurable capture intervals
- Secure data storage
System Requirements:
- Python 3.6+
- Windows OS (Windows 10/11 recommended)
- Administrator privileges (for some features)
Dependencies: The following packages will be installed automatically if missing:
pynputβ Keyboard and mouse event handlingrequestsβ HTTP requests for data transmissionpywin32β Windows API accesssounddeviceβ Audio capturescipyβ Scientific computing for audio processingPillowβ Image processing for screenshots
-
Clone or download the repository:
git clone https://github.com/Soumit-Santra/Keylogger cd Keylogger -
Ensure Python 3.6+ is installed:
python --version
-
Run the script (Administrator recommended):
python keylogger.py
-
β οΈ IMPORTANT: Run only on systems you own or have explicit written permission to test. -
Execute the script:
python keylogger.py
-
Monitor the output β The script will create an
informationdirectory containing:information/ βββ key_log.txt # Keyboard inputs βββ system_info.txt # System details βββ wifi_pass.txt # Saved WiFi credentials βββ clipboard.txt # Clipboard content βββ screenshots/ # Screen captures βββ audio/ # Sound recordings -
Stop the program safely using the configured key combination or by closing the terminal.
This project demonstrates several important programming and cybersecurity concepts:
Programming Concepts:
- File Operations β Reading, writing, and organizing files
- System Interaction β Interfacing with OS APIs
- Multi-threading β Concurrent execution of tasks
- Event Handling β Responding to system events
- Audio/Visual Capture β Working with multimedia data
- Network Information β Gathering system network details
Cybersecurity Concepts:
- System Monitoring β Understanding how monitoring tools work
- Data Collection β Learning about information gathering
- Security Awareness β Understanding potential vulnerabilities
- Ethical Hacking β Responsible security testing practices
Customizable Settings:
- Screenshot interval timing
- Audio recording duration
- Log file locations
- Monitoring sensitivity
- Data retention policies
Advanced Options:
- Stealth mode configuration
- Custom hotkeys for control
- Selective monitoring features
- Export formats for data
Generated Files:
- Detailed logs with timestamps
- System information reports
- Visual evidence through screenshots
- Audio recordings for analysis
- Network configuration details
Analysis Features:
- Structured data organization
- Timestamp correlation
- Pattern identification
- Security assessment reporting
Best Practices:
- Secure Storage β Encrypt sensitive data
- Access Control β Limit file permissions
- Data Retention β Delete logs after analysis
- Network Security β Secure data transmission
- Audit Trail β Maintain testing records
Privacy Protection:
- Data Minimization β Collect only necessary information
- Consent Management β Document all permissions
- Secure Deletion β Properly remove sensitive data
- Compliance β Follow data protection regulations
Responsible Use:
- Authorization First β Always get written permission
- Transparency β Inform users about monitoring
- Purpose Limitation β Use only for stated educational goals
- Data Protection β Secure all collected information
- Legal Compliance β Follow all applicable laws
Prohibited Uses:
- β Unauthorized surveillance
- β Malicious data collection
- β Privacy violations
- β Commercial exploitation
- β Harassment or stalking
Related Topics:
- Cybersecurity fundamentals
- Ethical hacking methodologies
- System administration
- Privacy and data protection
- Digital forensics
Recommended Reading:
- Python security programming
- Windows API documentation
- Cybersecurity best practices
- Legal aspects of security testing
Contributions for educational improvements are welcome! Please ensure all contributions maintain the educational focus and ethical guidelines.
Guidelines:
- Focus on educational value
- Maintain security best practices
- Include comprehensive documentation
- Follow ethical coding standards
- Administrative privileges may be required for some features
- Antivirus software may flag the program (expected behavior)
- Performance impact varies based on monitoring intensity
- Data size can grow quickly with continuous monitoring
For educational use only. Not for commercial or malicious use.
This project is provided for educational purposes under the understanding that:
- Users will act responsibly and ethically
- All applicable laws and regulations will be followed
- Proper consent and authorization will be obtained
- The software will not be used for malicious purposes
Soumit Santra
For educational questions, suggestions, or collaboration opportunities.
The author is not responsible for any misuse of this software.
Remember: With great power comes great responsibility. Use this tool ethically and legally.
This tool is meant to educate about cybersecurity concepts, not to enable malicious activities.
Stay ethical, stay legal, keep learning! π‘οΈπ