Skip to content

Soumit-Santra/Keylogger

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

25 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸŽ“ Educational Keylogger

Python Platform License Security

Created for Educational and Ethical Testing Purposes
Β© 2026 Educational Security Tools. All rights reserved.


⚠️ CRITICAL WARNING: EDUCATIONAL PURPOSES ONLY

🚨 This project is STRICTLY for educational and ethical testing purposes only.

Unauthorized use is illegal and unethical.


🚨 Legal Disclaimer

βš–οΈ IMPORTANT LEGAL NOTICE:

  • DO NOT use this software to monitor anyone without their explicit consent.
  • The author assumes NO responsibility for misuse or damages.
  • By using this tool, you agree to use it only for educational purposes on systems you own or have written permission to test.
  • Unauthorized keylogging may be illegal in your jurisdiction.
  • Check local laws and regulations before use.

πŸ›‘οΈ Ethical Guidelines:

  • Always obtain written permission before testing.
  • Never use for malicious or unauthorized purposes.
  • Keep logs secure and delete after testing.
  • Respect privacy and comply with all data protection laws.
  • Use in a controlled environment when possible.

πŸ“– Project Description

This is an intermediate-level Python keylogger designed to demonstrate various system monitoring techniques for educational purposes. It serves as a learning tool for understanding cybersecurity concepts and system interaction programming.


✨ Features

πŸ” Monitoring Capabilities:

  • ⌨️ Keyboard Input Logging β€” Capture and log keystrokes
  • πŸ–ΌοΈ Screenshot Capture β€” Automatic screen capture at intervals
  • 🎀 Audio Recording β€” Record system audio for analysis
  • πŸ“‹ Clipboard Monitoring β€” Track clipboard content changes
  • πŸ’» System Information Collection β€” Gather system details
  • πŸ“Ά WiFi Password Extraction β€” Retrieve saved WiFi credentials

⚑ Technical Features:

  • Multi-threaded operation for efficiency
  • Automatic dependency installation
  • Clean file organization
  • Error handling and logging
  • Configurable capture intervals
  • Secure data storage

πŸ› οΈ Requirements

System Requirements:

  • Python 3.6+
  • Windows OS (Windows 10/11 recommended)
  • Administrator privileges (for some features)

Dependencies: The following packages will be installed automatically if missing:

  • pynput β€” Keyboard and mouse event handling
  • requests β€” HTTP requests for data transmission
  • pywin32 β€” Windows API access
  • sounddevice β€” Audio capture
  • scipy β€” Scientific computing for audio processing
  • Pillow β€” Image processing for screenshots

πŸ’» Installation & Usage

πŸͺŸ Windows Installation

  1. Clone or download the repository:

    git clone https://github.com/Soumit-Santra/Keylogger
    cd Keylogger
  2. Ensure Python 3.6+ is installed:

    python --version
  3. Run the script (Administrator recommended):

    python keylogger.py

πŸš€ Usage Instructions

  1. ⚠️ IMPORTANT: Run only on systems you own or have explicit written permission to test.

  2. Execute the script:

    python keylogger.py
  3. Monitor the output β€” The script will create an information directory containing:

    information/
    β”œβ”€β”€ key_log.txt         # Keyboard inputs
    β”œβ”€β”€ system_info.txt     # System details
    β”œβ”€β”€ wifi_pass.txt       # Saved WiFi credentials
    β”œβ”€β”€ clipboard.txt       # Clipboard content
    β”œβ”€β”€ screenshots/        # Screen captures
    └── audio/             # Sound recordings
    
  4. Stop the program safely using the configured key combination or by closing the terminal.


πŸŽ“ Educational Value

This project demonstrates several important programming and cybersecurity concepts:

Programming Concepts:

  • File Operations β€” Reading, writing, and organizing files
  • System Interaction β€” Interfacing with OS APIs
  • Multi-threading β€” Concurrent execution of tasks
  • Event Handling β€” Responding to system events
  • Audio/Visual Capture β€” Working with multimedia data
  • Network Information β€” Gathering system network details

Cybersecurity Concepts:

  • System Monitoring β€” Understanding how monitoring tools work
  • Data Collection β€” Learning about information gathering
  • Security Awareness β€” Understanding potential vulnerabilities
  • Ethical Hacking β€” Responsible security testing practices

πŸ”§ Configuration

Customizable Settings:

  • Screenshot interval timing
  • Audio recording duration
  • Log file locations
  • Monitoring sensitivity
  • Data retention policies

Advanced Options:

  • Stealth mode configuration
  • Custom hotkeys for control
  • Selective monitoring features
  • Export formats for data

πŸ“Š Output & Analysis

Generated Files:

  • Detailed logs with timestamps
  • System information reports
  • Visual evidence through screenshots
  • Audio recordings for analysis
  • Network configuration details

Analysis Features:

  • Structured data organization
  • Timestamp correlation
  • Pattern identification
  • Security assessment reporting

πŸ›‘οΈ Security Considerations

Best Practices:

  • Secure Storage β€” Encrypt sensitive data
  • Access Control β€” Limit file permissions
  • Data Retention β€” Delete logs after analysis
  • Network Security β€” Secure data transmission
  • Audit Trail β€” Maintain testing records

Privacy Protection:

  • Data Minimization β€” Collect only necessary information
  • Consent Management β€” Document all permissions
  • Secure Deletion β€” Properly remove sensitive data
  • Compliance β€” Follow data protection regulations

βš–οΈ Ethical Guidelines

Responsible Use:

  • Authorization First β€” Always get written permission
  • Transparency β€” Inform users about monitoring
  • Purpose Limitation β€” Use only for stated educational goals
  • Data Protection β€” Secure all collected information
  • Legal Compliance β€” Follow all applicable laws

Prohibited Uses:

  • ❌ Unauthorized surveillance
  • ❌ Malicious data collection
  • ❌ Privacy violations
  • ❌ Commercial exploitation
  • ❌ Harassment or stalking

πŸ“š Learning Resources

Related Topics:

  • Cybersecurity fundamentals
  • Ethical hacking methodologies
  • System administration
  • Privacy and data protection
  • Digital forensics

Recommended Reading:

  • Python security programming
  • Windows API documentation
  • Cybersecurity best practices
  • Legal aspects of security testing

🀝 Contributing

Contributions for educational improvements are welcome! Please ensure all contributions maintain the educational focus and ethical guidelines.

Guidelines:

  • Focus on educational value
  • Maintain security best practices
  • Include comprehensive documentation
  • Follow ethical coding standards

πŸ“ Notes

  • Administrative privileges may be required for some features
  • Antivirus software may flag the program (expected behavior)
  • Performance impact varies based on monitoring intensity
  • Data size can grow quickly with continuous monitoring

πŸ“„ License

For educational use only. Not for commercial or malicious use.

This project is provided for educational purposes under the understanding that:

  • Users will act responsibly and ethically
  • All applicable laws and regulations will be followed
  • Proper consent and authorization will be obtained
  • The software will not be used for malicious purposes

πŸ“§ Contact

Soumit Santra
For educational questions, suggestions, or collaboration opportunities.


🚨 Final Reminder

The author is not responsible for any misuse of this software.

Remember: With great power comes great responsibility. Use this tool ethically and legally.

This tool is meant to educate about cybersecurity concepts, not to enable malicious activities.


Stay ethical, stay legal, keep learning! πŸ›‘οΈπŸ“š

About

A Python-based system activity monitoring and security research tool intended for controlled environments, focusing on user consent, data transparency, and defensive cybersecurity learning.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages