Welcome to the Off-Shore Club

The #1 Social Engineering Project in the world since 2004 !

Important Notice:

✅UPGRADE YOUR ACCOUNT TODAY TO ACCESS ALL OFF-SHORE FORUMS✅

[New]Telegram Channel

In case our domain name changes, we advise you to subscribe to our new TG channel to always be aware of all events and updates -
https://t.me/rtmsechannel

OFF-SHORE Staff Announcement: 30% Bonus on ALL Wallet Deposit this week


For example, if you deposit $1000, your RTM Advertising Balance will be $1300 that can be used to purchase eligible products and service on forums or request withdrawal. The limit deposit to get the 30% bonus is $10,000 for a $3000 Marketplace wallet balance Bonus.

Deposit Now and claim 30% more balance ! - BTC/LTC/XMR


Always use a Mixer to keep Maximum anonimity ! - BTC to BTC or BTC to XMR

How to create a keylogger for Chrome browser on Linux

⚠️Always Remember to keep your identity safe by using a Zero-KYC Zero-AML like https://coinshift.money⚠️

Gold

Mr. Nick

Well-known Hacker
USDT(TRC-20)
$0.0
Many associate such programs with illegal activities and malware. Despite the fact that keyloggers can be viewed as an invasion of privacy, it still does not violate the law in any way. Parents, for example, can acquire such software to protect their children on the Internet - and find out who they communicate with on Facebook or Whatsapp. The app tracks data on PC, Mac, iPhone and other devices.

The employer, in turn, can draw a conclusion about what his employees are doing during work. The system provides detailed online reports on staff productivity.

Another possible use of a keylogger is to protect privacy settings, passwords and data that may be lost due to bugs in the computer. But, on the other hand, an attacker using a keylogger can gain access to private and confidential information, which, of course, is prohibited by law.

What it is
Keylogger is a type of software that is used to track or log all keystrokes on the keyboard. The user of an electronic device may not even suspect that any clicks and presses are recorded, and the keylogger remembers absolutely everything - up to correspondence in social networks and chats. The presence of such a program is almost impossible to notice, since it functions in the background as an integral part of the operating system.

In this post, we will talk about one interesting utility Hera, with its help you can easily create your own keylogger for the Chrome browser, which in turn will send you all the information entered by the victim.

The use of keyloggers is especially important in many areas of government agencies, because it is in this area that the task of having secret data and keeping it secret by employees who have access to them is urgent. At the same time, a keylogger will not be superfluous on a PC in a large company or firm, because they also have information that may be of interest, for example, to competitors.

Installation:
Code:
git clone https://github.com/UndeadSec/HeraKeylogger
cd HeraKeylogger
sudo apt-get install python3-pip -y
sudo pip3 install -r requirements.txt

Usage:
Code:
python3 hera.py

The created keylogger will be in the utility folder called “MaliciousExtension”. You need to install it in the victim's browser, then it will send you all keystrokes.

CHECKED ON:
  • Kali Linux - Rolling Edition
  • Linux Mint - 18.3 Sylvia
  • Ubuntu - 16.04.3 LTS
  • MacOS High Sierra

Keyloggers work equally well on both Windows and Linux operating systems. There are no differences in the functionality and operation of this tool when it is run on different operating systems. After installing the keylogger:
  • automatically starts when the operating system starts;
  • works imperceptibly for the user himself;
  • to record all actions carried out by the user through the keyboard - any keystrokes and actions that follow him - are recorded and recorded;
  • monitor the installation, frequency and duration of application use;
  • the report document can be viewed either under your account, or on any other device.
Installing a keylogger is a great way to secure important information by protecting it from unauthorized access by third parties, spy "attacks" or transmission to competitors.

Screenshot:
 
Many associate such programs with illegal activities and malware. Despite the fact that keyloggers can be viewed as an invasion of privacy, it still does not violate the law in any way. Parents, for example, can acquire such software to protect their children on the Internet - and find out who they communicate with on Facebook or Whatsapp. The app tracks data on PC, Mac, iPhone and other devices.

The employer, in turn, can draw a conclusion about what his employees are doing during work. The system provides detailed online reports on staff productivity.

Another possible use of a keylogger is to protect privacy settings, passwords and data that may be lost due to bugs in the computer. But, on the other hand, an attacker using a keylogger can gain access to private and confidential information, which, of course, is prohibited by law.

What it is
Keylogger is a type of software that is used to track or log all keystrokes on the keyboard. The user of an electronic device may not even suspect that any clicks and presses are recorded, and the keylogger remembers absolutely everything - up to correspondence in social networks and chats. The presence of such a program is almost impossible to notice, since it functions in the background as an integral part of the operating system.

In this post, we will talk about one interesting utility Hera, with its help you can easily create your own keylogger for the Chrome browser, which in turn will send you all the information entered by the victim.

The use of keyloggers is especially important in many areas of government agencies, because it is in this area that the task of having secret data and keeping it secret by employees who have access to them is urgent. At the same time, a keylogger will not be superfluous on a PC in a large company or firm, because they also have information that may be of interest, for example, to competitors.

Installation:
Code:
git clone https://github.com/UndeadSec/HeraKeylogger
cd HeraKeylogger
sudo apt-get install python3-pip -y
sudo pip3 install -r requirements.txt

Usage:
Code:
python3 hera.py

The created keylogger will be in the utility folder called “MaliciousExtension”. You need to install it in the victim's browser, then it will send you all keystrokes.

CHECKED ON:
  • Kali Linux - Rolling Edition
  • Linux Mint - 18.3 Sylvia
  • Ubuntu - 16.04.3 LTS
  • MacOS High Sierra

Keyloggers work equally well on both Windows and Linux operating systems. There are no differences in the functionality and operation of this tool when it is run on different operating systems. After installing the keylogger:
  • automatically starts when the operating system starts;
  • works imperceptibly for the user himself;
  • to record all actions carried out by the user through the keyboard - any keystrokes and actions that follow him - are recorded and recorded;
  • monitor the installation, frequency and duration of application use;
  • the report document can be viewed either under your account, or on any other device.
Installing a keylogger is a great way to secure important information by protecting it from unauthorized access by third parties, spy "attacks" or transmission to competitors.

Screenshot:
Thanks
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Friendly Disclaimer We do not host or store any files on our website except thread messages, most likely your DMCA content is being hosted on a third-party website and you need to contact them. Representatives of this site ("service") are not responsible for any content created by users and for accounts. The materials presented express only the opinions of their authors.
🚨 Do not get Ripped Off ! ⚖️ Deal with approved sellers or use RTM Escrow on Telegram
Gold
Mitalk.lat official Off Shore Club Chat


Gold

Panel Title #1

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

Panel Title #2

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.
Top