Amnesia is a powerful and advanced keylogger created by the developer Raven, using the Python programming language.
It is designed to be used on a local network and allows victims to connect to it, saving all of their keystrokes.
This data is then stored on the server, where it can be accessed and analyzed by the attacker.
Features
- Creates a server on a local network for victims to connect to: Amnesia creates a server on the local network, which victims can connect to. This server is the point where all the keystrokes from the victim's device are sent to and stored.
- Saves all keystrokes from connected victims: Once the victim's device is connected to the server, Amnesia begins logging all keystrokes made on the device. This data is then stored on the server for later analysis.
- Creates a web server for victims to download the client from: Amnesia also creates a web server, which allows victims to download the client that they need to connect to the server. This client is necessary for the keylogger to function properly.
Modules used:
- Sockets: Sockets are used to create the server and establish connections between the victim's device and the server.
- Logging: The logging module is used to keep track of all keystrokes and save them to the server.
- Http.server: The Http.server module is used to create the web server, which allows victims to download the client.
- sys: The sys module is used for system-specific parameters and functions.
- pynput.keyboard: The pynput.keyboard module is used to track and log all keystrokes made on the victim's device.
How to use
- Clone the repository to your local machine or download the script to your computer.
- Cd into the cloned repo
- Start the webserver and server by typing
python server.py
and python webserver.py
.
- Let the victim download the script:
- You lure them into the pre-made website to download it
- Do it your own way
- You can compile the script into executable so antivirus doesn't find it
Pyarmor, Pyinstaller
- Wait until your victim executes the script
- Your devices will establish a connection
- All keys will be logged into a
activity.log
file
Note
Please be aware that keyloggers are unethical and illegal in many cases, use it only for legal and authorized pentesting or educational purposes.