Awesome Keylogging Script - BeeLogger

Nov 11, 2017 12:56 AM
636459247798304752.jpg

Sup, my fellow white hat hackers!

In this tutorial, I will show you an AWESOME script for key logging.

It can be hidden in lots of different formats, even .docx(Microsoft word), and .pptx(Microsoft Powerpoint).

Oh yes, what you need is a Kali Linux and that is it.

This is actually illegal to use on other peoples, so, promise me you will not use it for the bad.

Now, put your hats on,( I hope it is a white one) and get ready.

It will take long, but IT IS WORTH IT.

Step 1: Clone It!

My every tutorial starts with this one, cloning it. To clone it, type :

git clone https://github.com/4w4k3/BeeLogger

this will install it, now type : " cd BeeLogger " to go to the directory, and type " ls " to see what is in there.

636459247798304752.jpg

Step 2: Execute It!

Now we cloned the script to our Kali Linux, we need to execute the script.

But before that, we need to install what we need. Type :

./install.sh

IMPORTANT This command will install things. It will install wine,python,all kind of that stuff. It is a long boring step, it takes like ages to do that, but it is easy, just keep pressing next. So I will not show this step. But, in the wine configuration, select Windows 7 instead of the windows XP, Then press OK.

Finally, It is done!

636459282968270167.jpg

Now we can execute the script! To do that, type in :

python bee.py

After that, there will be a image of a bee, then press enter.

636459284892417610.jpg

Now, there will be this page.

636459287470386498.jpg

We are going to generate a keylogger, so press K.

And, Ta-da. There are lots of options like :

636459288951482741.jpg

You can choose any, 1 to 6. But, you will need to make a gmail account and type the email inside to get what the victim is typing. So quickly make a gmail account, and select one.

I chose number 2. Now, go to https://www.google.com/settings/security/lesssecureapps.

And select Turn On(Make sure you are logged in). Other wise it will not work. The reason that it needs the email address is because it is a way to communicate with you without port forwarding.

Now, I am pretty sure you can do the rest. Send the file to the victim, the victim opens it, the keylogging begins and sends the text that the victim typed to your gmail account.

Comments

No Comments Exist

Be the first, drop a comment!