Linux Keystroke Reflection

Linux Keystroke Reflection
Download Copy
Title: Linux Keystroke Reflection
Author: TW-D

Implementation of the "Keystroke Reflection" technique for file exfiltration.

🏆   Recognized with a Payload Award in June 2024

 

Exfiltration is an involuntary backup. It's a technique for obtaining data from a network. Once obtained, the data may be removed using a number of methods. These may include traversing the network to a command and control server, such as Cloud C². The content is typically encrypted or obfuscated. In the case of physical access, a bring-your-own-network element may be included to evade detection. See all exfiltration payloads.

This payload is for the Key Croc, a keylogger armed with pentest tools, remote access and payloads that trigger multi-vector attacks when chosen keywords are typed. It's the ultimate key-logging pentest implant.

Submit your own payload, or browse more featured Key Croc Payloads.

 

 

Related Payloads

WAR GAMES
WAR GAMES
A text adventure game inspired by the 1983 film WarGames. Set in December 2025, you play as James Lightman, son of the l
Read More
Strip Connected Clients
Strip Connected Clients
Pulls previously connected clients from the recon database and stores that list in a file located in /root/loot/info.
Read More
Strip Open AP
Strip Open AP
Strips open access points from the recon database and stores that list in a file located in /root/loot/pools.
Read More