This project is a comprehensive security research tool designed to demonstrate several aspects of system and network security. It includes:
- A Python Keylogger that captures keystrokes.
- A PowerShell script (
stage1.ps1) that includes a reverse shell payload. - A second PowerShell script (
totallysafe.ps1) that executes the reverse shell and performs additional tasks. - A Python Nmap library for network scanning.
- An executable file that integrates these components.
Disclaimer: This project is intended for educational purposes only. Unauthorized use of these techniques is illegal and unethical. Always ensure you have proper authorization before conducting any security testing.
Captures keystrokes and stores them for analysis.
stage1.ps1: Contains the reverse shell payload.totallysafe.ps1: Executes the reverse shell and performs additional actions.
Used for network scanning to identify open ports, vulnerabilities, and firewall states.
Consolidates all components into a single executable file for deployment.
- Python 3.x
- PowerShell
- Netcat (optional, for specific network tasks)
- A Windows environment for testing
-
Clone the Repository
git clone https://github.com/yourusername/yourproject.git cd yourproject -
Install Dependencies
-
Ensure you have the Python Nmap library installed:
pip install python-nmap
-
Make sure PowerShell is available and configured correctly on your system.
-
-
Build the Executable
-
Use tools like PyInstaller to convert the Python script into an executable:
pyinstaller --onefile your_script.py
Replace
your_script.pywith the Python script you wish to convert. -
Warning: This tool should only be used in controlled, ethical scenarios.
-
Run the Keylogger
Execute the keylogger Python script or the compiled executable.
-
Deploy PowerShell Scripts
-
Run
stage1.ps1using PowerShell:powershell -ExecutionPolicy Bypass -File path\to\stage1.ps1
-
Ensure
totallysafe.ps1is properly integrated into the environment.
-
-
Start Network Scanning
Use the Python Nmap library for network scanning tasks.
-
Monitor and Analyze
- Check the log files or data output by the keylogger.
- Review network scan results for vulnerabilities.
This project is for educational purposes only. Unauthorized access to systems, data, or networks is illegal and unethical.
- Authorization: Always obtain explicit consent before testing or deploying security tools.
- Privacy: Respect privacy and data protection laws.
- Responsibility: Use this knowledge to improve security, not to exploit vulnerabilities.
This project is licensed under the MIT License - see the LICENSE file for details.
Note: The contents of this project and README are provided for educational purposes only. Use them responsibly and in compliance with legal and ethical standards.
### Key Points Covered:
1. **Project Overview**: Describes the components and purpose.
2. **Installation**: Lists requirements and steps for setup.
3. **Usage**: Instructions on running and using the components.
4. **Ethical Considerations**: Emphasizes the importance of legal and ethical use.
5. **License and Contact Information**: Provides licensing details and contact information.
**Important**: Make sure that any use of such tools is performed ethically and legally, with proper authorization and in a controlled environment.