KeyLogin

KeyLogin
Download Copy
Title: KeyLogin
Author: 0iphor13

This extremely simple payload will lock the targets machine and will wait for it to insert the password. Afterwards these will be exfiltrated to your CloudC2 instance. The most covert technique to get clear text credentials!

🏆   Recognized with a Payload Award in September 2023

 

Credential harvesting is the method of obtaining credentials — think usernames and passwords. Many techniques are used to obtain credentials, from keylogging to credential dumping. With a set of credentials in hand, red teamers may access systems and make lateral movement across the network, as well as creating their own credentials which may be difficult to detect in a breach. See all credential payloads.

This payload is for the Key Croc, a keylogger armed with pentest tools, remote access and payloads that trigger multi-vector attacks when chosen keywords are typed. It's the ultimate key-logging pentest implant.

Submit your own payload, or browse more featured Key Croc Payloads.

 

 

Related Payloads

Windows Duck In The Middle
Windows Duck In The Middle
This payload sets up a trustworthy proxy for the user, enabling a Man-in-the-middle attack. After executing your payload
Read More
Windows Product Key Grabber
Windows Product Key Grabber
This payload sends you the target PC's Windows product key via Dropbox.
Read More
Linux Keystroke Reflection
Linux Keystroke Reflection
Implementation of the "Keystroke Reflection" technique for file exfiltration.
Read More