Skip to content

A powerful, modular tool for ethical hacking and red team simulations. Features advanced keylogging (for lab use), stealth PowerShell payloads, reverse shell execution, and Nmap-based network recon — all packaged for real-world adversarial emulation. Use responsibly.

License

Notifications You must be signed in to change notification settings

Rbholika/SilentVector

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Keylogger - 100% successful Bypass of Windows11 Defender (2024)

Project Overview

This project is a comprehensive security research tool designed to demonstrate several aspects of system and network security. It includes:

  • A Python Keylogger that captures keystrokes.
  • A PowerShell script (stage1.ps1) that includes a reverse shell payload.
  • A second PowerShell script (totallysafe.ps1) that executes the reverse shell and performs additional tasks.
  • A Python Nmap library for network scanning.
  • An executable file that integrates these components.

Disclaimer: This project is intended for educational purposes only. Unauthorized use of these techniques is illegal and unethical. Always ensure you have proper authorization before conducting any security testing.

Components

1. Python Keylogger

Captures keystrokes and stores them for analysis.

2. PowerShell Scripts

  • stage1.ps1: Contains the reverse shell payload.
  • totallysafe.ps1: Executes the reverse shell and performs additional actions.

3. Python Nmap Library

Used for network scanning to identify open ports, vulnerabilities, and firewall states.

4. Executable File

Consolidates all components into a single executable file for deployment.

Installation

Requirements

  • Python 3.x
  • PowerShell
  • Netcat (optional, for specific network tasks)
  • A Windows environment for testing

Steps

  1. Clone the Repository

    git clone https://github.com/yourusername/yourproject.git
    cd yourproject
  2. Install Dependencies

    • Ensure you have the Python Nmap library installed:

      pip install python-nmap
    • Make sure PowerShell is available and configured correctly on your system.

  3. Build the Executable

    • Use tools like PyInstaller to convert the Python script into an executable:

      pyinstaller --onefile your_script.py

    Replace your_script.py with the Python script you wish to convert.

Usage

Warning: This tool should only be used in controlled, ethical scenarios.

  1. Run the Keylogger

    Execute the keylogger Python script or the compiled executable.

  2. Deploy PowerShell Scripts

    • Run stage1.ps1 using PowerShell:

      powershell -ExecutionPolicy Bypass -File path\to\stage1.ps1
    • Ensure totallysafe.ps1 is properly integrated into the environment.

  3. Start Network Scanning

    Use the Python Nmap library for network scanning tasks.

  4. Monitor and Analyze

    • Check the log files or data output by the keylogger.
    • Review network scan results for vulnerabilities.

Ethical and Legal Considerations

This project is for educational purposes only. Unauthorized access to systems, data, or networks is illegal and unethical.

  • Authorization: Always obtain explicit consent before testing or deploying security tools.
  • Privacy: Respect privacy and data protection laws.
  • Responsibility: Use this knowledge to improve security, not to exploit vulnerabilities.

License

This project is licensed under the MIT License - see the LICENSE file for details.


Note: The contents of this project and README are provided for educational purposes only. Use them responsibly and in compliance with legal and ethical standards.


### Key Points Covered:

1. **Project Overview**: Describes the components and purpose.
2. **Installation**: Lists requirements and steps for setup.
3. **Usage**: Instructions on running and using the components.
4. **Ethical Considerations**: Emphasizes the importance of legal and ethical use.
5. **License and Contact Information**: Provides licensing details and contact information.

**Important**: Make sure that any use of such tools is performed ethically and legally, with proper authorization and in a controlled environment.

About

A powerful, modular tool for ethical hacking and red team simulations. Features advanced keylogging (for lab use), stealth PowerShell payloads, reverse shell execution, and Nmap-based network recon — all packaged for real-world adversarial emulation. Use responsibly.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published