A Python-based tool to detect potential keyloggers on your system by monitoring suspicious processes and activities. Built for Kali Linux, this tool helps identify unauthorized programs that may be capturing keystrokes.
The Keylogger Detector works by analyzing running processes and system activities to identify potential keyloggers. Here's how it functions:
-
Process Monitoring:
- The tool scans all running processes on the system.
- It checks for known keylogger signatures or suspicious behavior (e.g., processes with "keylogger" in their name).
-
Network Activity Monitoring:
- The tool monitors network connections to detect processes sending data to external servers (a common behavior of keyloggers).
-
File System Monitoring:
- The tool scans for suspicious files or directories commonly associated with keyloggers.
-
Alert System:
- If a potential keylogger is detected, the tool alerts the user with details about the suspicious process or activity.
- Kali Linux (or any Linux distribution with Python 3).
- Python 3.x.
- The
psutil
library (install usingpip
).
- Install Required Libraries:
sudo apt update sudo apt install python3-pip pip3 install psutil
- Clone the Repository:
git clone https://github.com/yourusername/keylogger-detector.git
cd keylogger-detector
- Run the Script:
sudo python3 keylogger_detector.py
- Usage:
Run the script:
sudo python3 keylogger_detector.py
The tool will start scanning your system for potential keyloggers. If a suspicious process or activity is detected, the tool will display an alert with details.
Example Output:
$ sudo python3 keylogger_detector.py
[*] Starting keylogger detection...
[!] Potential keylogger detected:
Process Name: evil_keylogger
PID: 1234
Network Connection: 192.168.1.100:8080
[!] Suspicious file detected:
File Path: /usr/local/bin/keylogger.sh
File Size: 1024 KB
[*] Scan complete. Check the results above.