Show others for educational purposes how it was done.ĭownload the Entire Project Including Source, Pre-Complied Example, Build File and Documentation Here: Allow a Hot Key combination to stop it.ĩ. Don't place the Global Low-Level Hook procedure in a. Allow this to be installed and run using a non ADMIN account.ħ. Provide as much information as possible of WHERE the key strokes came from.Ħ. Allow logging files on a per user basis.ĥ. Make sure only ONE copy per user can run but support fast user switching.Ĥ. Minimize as much as possible, CPU overhead.ģ. The program was created because MANY people claimed that you could NOT use a Stand-Alone program ("Without the Global hook procedure being located in a DLL") to do This program is 3.5K small, as in 3,584 bytes and can do ANYTHING other Key-Loggers claim, this is Version 1.0, a Stealth version will be next to show Hiding concepts. This is a Proof Of Concept for Educational Purposes ONLY! The Programs and Files included are Copyright 2005, by ZOverLord, All Rights Reserved This Project is now a Featured Article on :-)
0 Comments
Leave a Reply. |