Welcome to a Beginner's Guide to Keyloggers! In this guide I will go through all the common topics that you may need to know. When you finish reading this topic you will know everything you will ever need to get started keylogging. I cover every topic related to keyloggers as well as cover terminology and definitions. I'll explain how a keylogger works and how to even get started making your own! So let's get started!
- What is a keylogger?
- Learning the lingo and definitions.
- Common features keyloggers have.
- How do I use a keylogger?
- What is a "stub"?
- What is the "server"?
- What is crypting?
- What is the difference between a stealer and a keylogger?
- What is .net framework and why do I care?
- What are some good keyloggers?
- What are some upsides to keyloggers?
- What are some downsides to keyloggers?
- I want to make my own keylogger. Where do I start?
- I think I've been infected with a keylogger! What do I do?
- Conclusion
- Logger
- Slang term for keylogger. See the "What is a keylogger" section.
- Hooks
- Slang term for keyboard hooks. These are also explained in the "What is a keylogger section"
- Keystrokes
- Section of code that is triggered when the slave types something on the keyboard.
- Logs
- Compiliation of all the keystrokes over a period of time.
- FTP
- A webhost that stores files that allows the user to connect and retrieve said files. Files in this case are logs.
- SMTP
- A way that logs are sent via email. Example, MSN, Gmail, Yahoo, etc.
- FUD
- Full Un-Detected. This means that antiviruses will not detect your file as a virus. This will be further explained in the "What is crypting section".
- UD
- Undetected. This means that some antiviruses will not detect your files as a virus, while others will.
- Server
- A server is the output of your keylogger. I will take this in-depth in the "What is a server?" section.
- Crypter
- A crypter crypts your file removing detections. I'll take this in-depth in the "What is crypting" section.
- Detection
- A detection is a term used when an antivirus detects, or thinks your file is a virus. You always want to have the least amount of detections possible to increase your success rate and to reduce errors.
- Black hat
- A black hat is someone who uses their knowledge of computers and security for malicious reasons.
- White hat
- A white hat is someone who uses their knowledge of computers and security for helpful reasons. They help disinfect and improve others security to combat black hat hackers.
- Grey hat
- A grey hat is a mixture between a black and white hat. They will infect innocent people and then help them get rid of it, for free or a price (the latter being more common).
- Backdoored
- When a file is backdoored it has a virus binded to it. This means that the file will act normally and the user will be infected without their knowledge. This has become extremely common in the keylogger section. Always be wary of new releases.
- Icon Changers
- This will change your viruses icon without corrupting it like some third party programs can do.
- MuteX
- MuteX is a unique string that you generate. It helps prevent multiple logs from being sent.
- Add to Startup
- This will add a registry (or other ways) that will cause your virus to start when the computer is turned on.
- Antis
- Antis are a feature that help keep your virus on the slaves computer for as long as possible. They disable or stop certain white hat programs such as antiviruses, sandboxie, and keyscramblers from running or removing your file.
- Disable CMD/Taskmanager/Registry
- This feature will change the registry value for each of these system tools to disable them.
- Logging interval
- This allows the user to chose how often logs are sent.
- Fake Error Message
- This will cause a fake error message to pop up, making it seem less suspicious.
- File pumper
- This will add to the size of your virus. This helps making it seem less suspicious as a game won't be a few kilobytes.
- Assembly Editing
- This allows you to change things found in the properties menu when right clicking a file. This helps it seem more like a real file rather than a virus.
- Encrypted user information
- This encrtyps your information so that others cannot steal it by decompiling your virus.
- Test connection
- This will test your credentials that you've entered to make sure they are correct.
WHAT IS A "STUB"
WHAT IS CRYPTING ?
About the Author

Follow Me on Facebook Rockstar Basit
Follow Me on Twitter Rockstar Basit
Skype ID : rock.star.rsb