Skip to content
/ TeleLog Public

This Python tool generates an obfuscated keylogger, capturing keystrokes and sending it back to Telegram. It uses encryption, anti-debugging, and obfuscation to evade detection. For educational use only; deploy responsibly with proper authorization.

Notifications You must be signed in to change notification settings

4lp1ne/TeleLog

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

25 Commits
 
 
 
 

Repository files navigation

TeleLog

Keylogger Auto-generate, Auto-Obfuscate, Auto-Compiler.

This repository contains a Python-based tool that generates an obfuscated keylogger script and compiles it into an executable file. The tool is designed to work in two steps:

  1. First Script (first.py): Generates an obfuscated keylogger script (rto.py) after taking user input for the Telegram Bot API key and Chat ID.
  2. Second Script (second.py): Fixes the script structure, re-obfuscates it, and compiles it into an executable file (rtc.exe).

The final executable is placed in a folder called minified\dist.


Table of Contents

  1. Requirements
  2. Installation
  3. Usage
  4. Folder Structure
  5. Important Notes
  6. Disclaimer

Requirements

Before running the scripts, ensure you have the following installed:

  • Python 3.8 or higher
  • Pip (Python package manager)
  • Modules: pyinstaller, pyminifier,requests,cryptography,keyboard

Installation

  1. Clone the Repository:

    git clone https://github.com/yourusername/your-repo-name.git
    cd your-repo-name
  2. Install Dependencies: Run the following command to install the required Python modules:

    pip install -r requirements.txt

    This will install all the necessary libraries, including cryptography, keyboard, requests, and pyminifier.


Usage

Step 1: Run first.py

  1. Execute the Script: Run the first.py script to generate the obfuscated keylogger script:

    python first.py
  2. Provide Input:

    • When prompted, enter your Telegram Bot API Key.
    • Next, enter your Chat ID.
  3. Output:

    • The script will generate a secret.key file (used for encryption).
    • It will also create an obfuscated script (rto.py) in the current directory.
    • Finally, it will create a folder called minified and move the obfuscated script (rto.py) into it.

Step 2: Run second.py

  1. Navigate to the minified Folder:

    cd minified
  2. Execute the Script: Run the second.py script to fix the script structure and compile it into an executable:

    python second.py
  3. Output:

    • The script will extract the obfuscated code, re-obfuscate it, and generate a new script (rtc.py).
    • It will then compile rtc.py into an executable (rtc.exe) using pyinstaller.
    • The executable will be placed in the dist folder inside the minified directory.

Folder Structure

After running both scripts, your folder structure will look like this:

TeleLog/
├── first.py
├── requirements.txt
├── secret.key
├── minified/
│   ├── rto.py
│   ├── second.py
│   ├── extractedtext.txt
│   ├── rtc.py
│   └── dist/
│       └── rtc.exe

Important Notes

  • Telegram Bot API Key and Chat ID: You need a valid Telegram Bot API key and Chat ID to receive logs. You can create a bot using BotFather and get your Chat ID using tools like @userinfobot.
  • Obfuscation: The scripts use pyminifier for obfuscation. Ensure you have installed it via requirements.txt.
  • Anti-Debugging and Environment Checks: The script includes anti-debugging and environment checks to detect debuggers, virtual machines, or sandboxes.
  • Compilation: The second.py script uses pyinstaller to compile the script into an executable. Ensure pyinstaller is installed.

Disclaimer

This tool is intended for educational purposes only. The authors do not condone or support the use of this tool for any malicious or illegal activities. Always ensure you have proper authorization before using this tool on any system.


License

This project is licensed under the MIT License. See the LICENSE file for details.


For any issues or questions, please open an issue on the GitHub repository.

About

This Python tool generates an obfuscated keylogger, capturing keystrokes and sending it back to Telegram. It uses encryption, anti-debugging, and obfuscation to evade detection. For educational use only; deploy responsibly with proper authorization.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages