• Home
  • Hacking & Security
    • Network Hacking
    • Web Hacking
    • Social Engineering
    • Kali Linux
    Submit An Article
  • Courses
    • All Courses
    • Bundles
    • Masterclass
    • VIP Membership
    • FAQ

    Popular Courses

  • Shop
    • Hardware Bundles
    • Wireless Adapters
    • Pentesting Tools
    • Security
    • Accessories
    • Clothing
    • Books
    • All
  • Competition
  • Services
    Penetration Testing
    Consulting
    Code Review
    One on one Training
    Online Courses
    VPN
  • Blog
      • Cart

    VIP Membership Masterclass
    Got a question?
    [email protected]
    RegisterLogin
    zSecurity
    • Home
    • Hacking & Security
      • Network Hacking
      • Web Hacking
      • Social Engineering
      • Kali Linux
      Submit An Article
    • Courses
      • All Courses
      • Bundles
      • Masterclass
      • VIP Membership
      • FAQ

      Popular Courses

    • Shop
      • Hardware Bundles
      • Wireless Adapters
      • Pentesting Tools
      • Security
      • Accessories
      • Clothing
      • Books
      • All
    • Competition
    • Services
      Penetration Testing
      Consulting
      Code Review
      One on one Training
      Online Courses
      VPN
    • Blog
        • Cart

      Hacking & Security

      zLogger – Remote Keylogger for Windows & Linux

      • Posted by Zaid Sabih
      • Date December 14, 2018

      zLogger is a Remote persistent keylogger it is written in python, and can generate executables that run on Windows and Linux, once executed on a system it’ll run the background, record every key-strike and report to the email specified when the keylogger was generated.

      Features:

      • Logs keys pressed on keyboard
      • Sends reports by email.
      • Starts with system startup.
      • Works with Linux and Windows.
      • Does not require root or admin privileges.

       

      Installation:

      1. Nvigate to the /opt directory (optional):

      cd /opt/

       

      2. Clone the repo

      git clone https://github.com/z00z/ZLogger.git

       

      3. Navigate into zLogger’s directory

      cd ZLogger

       

      4. Run the installer

      bash install.sh

      PS: this might take some time as it’ll install all the programs and libraries needed by zLogger.

       

      5. Done, now you can run zLogger from this working directory using the following command

      python zlogger.py

       

      Usage:

       

      Removing the keylogger:

      1. Go to star, type regedit and run the first program, this will open the registry editor.
      2. Navigate to the following path Computer\HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
      3. There should be an entry called winexplorer, right click this entry and select Delete.
      4. Go to your user path > AppData > Roaming, you’ll see a file named “Windows Explorer.exe”, this is the keylogger, right click > Delete.

       

      Resources:

      • zLogger Git repo – https://github.com/z00z/ZLogger
      • Share:
      author avatar
      Zaid Sabih

      Ethical Hacker, Pentester & Computer Scientist

      Zaid Al-Quraishi is an ethical hacker, computer scientist, and founder of zSecurity. He studied Computer Science at University College Dublin, graduating May 2016.

      Zaid has a strong background and experience in ethical hacking, starting with video tutorials in 2009 in an ethical hacking community, iSecur1ty.org. He also worked as a penetration tester (pentester) for this company.

      In 2013 he started teaching his first course online in Arabic which received extremely positive feedback. This motivated him to create an English version of the course. The English course became the most popular and top paid course on Udemy for almost a year, which further motivated Zaid to design and teach more courses on ethical hacking.

      He now offers a number of courses on ethical hacking and more than 800,000 students on Udemy and other teaching platforms such as StackSocial, StackSkills and zSecurity.

      Zaid says: "I just love hacking and breaking the rules but don't get me wrong, I am an ethical hacker!"

      Previous post

      Bit-Flipping Attacks against Cipher Block Chaining Algorithms
      December 14, 2018

      Next post

      How Hackers Hack into Secure Systems
      January 24, 2019

      You may also like

      xss_370x208
      Exploiting Reflected XSS to steal login credentials
      6 February, 2023
      wordpress-pentesting_370x208
      WordPress pentesting
      30 January, 2023
      mimikatz_370x208
      Dump LSASS without Mimikatz via MiniDumpWriteDump!
      19 January, 2023

        7 Comments

      1. Dawit Seged
        November 22, 2019
        Log in to Reply

        while installing the “install.sh” later on i can’t install python( i can’t locate folder).
        what is the problem?

      2. Monika
        February 7, 2020
        Log in to Reply

        sir it show no such file directory please tell me sir what i should do

      3. y4gud007
        July 16, 2020
        Log in to Reply

        I received an error message when trying to execute the program on target computer. “Fatal error detected, Failed to execute script” Any help?

        • Rishav mehra
          December 9, 2020
          Log in to Reply

          Hy bro, do you get your error solutions

      4. hemanthreddy1211734
        August 26, 2020
        Log in to Reply

        Traceback (most recent call last):
        File “zlogger.py”, line 39, in
        compile_for_windows(arguments.out)
        File “zlogger.py”, line 30, in compile_for_windows
        subprocess.call([“wine”, WINDOWS_PYTHON_INTERPRETER_PATH, “–onefile”, “–noconsole”, file_name])
        File “/usr/lib/python2.7/subprocess.py”, line 172, in call
        return Popen(*popenargs, **kwargs).wait()
        File “/usr/lib/python2.7/subprocess.py”, line 394, in __init__
        errread, errwrite)
        File “/usr/lib/python2.7/subprocess.py”, line 1047, in _execute_child
        raise child_exception
        OSError: [Errno 2] No such file or directory

      5. salonee jaiswal
        October 21, 2020
        Log in to Reply

        Traceback (most recent call last):
        File “zlogger.py”, line 36, in
        create_keylogger(arguments.out, arguments.interval, arguments.email, arguments.password)
        File “zlogger.py”, line 23, in create_keylogger
        with open(file_name, “w+”) as file:
        IOError: [Errno 13] Permission denied: ‘keylogger’

        I am getting this error while running zlogger…plz help me fixing this problem

      6. shomit_tf
        March 18, 2021
        Log in to Reply

        Traceback (most recent call last):
        File “zlogger.py”, line 39, in
        compile_for_windows(arguments.out)
        File “zlogger.py”, line 30, in compile_for_windows
        subprocess.call([“wine”, WINDOWS_PYTHON_INTERPRETER_PATH, “–onefile”, “–noconsole”, file_name])
        File “/usr/lib/python2.7/subprocess.py”, line 172, in call
        return Popen(*popenargs, **kwargs).wait()
        File “/usr/lib/python2.7/subprocess.py”, line 394, in __init__
        errread, errwrite)
        File “/usr/lib/python2.7/subprocess.py”, line 1047, in _execute_child
        raise child_exception
        OSError: [Errno 2] No such file or directory

        getting this error

      Leave A Reply Cancel reply

      You must be logged in to post a comment.

      Categories

      • Cryptography
      • Cryptography
      • CTF
      • Forensics
      • Hacking & Security
      • Hardware
      • IOT
      • Kali Linux
      • Network Hacking
      • News
      • OSINT
      • Post Exploitation
      • Post Exploitation
      • Privacy
      • Programming
      • Security
      • Social Engineering
      • Uncategorized
      • Web Hacking

      Popular Posts

      Got a Blank Screen After Importing Kali in Virtual Box ? Here’s How To Fix It
      25Jan2018

      Connect with us

      • Facebook
      • Twitter
      • LinkedIn
      • Instagram
      • Youtube

      “Everything related to ethical hacking

      & cyber security in one place.”

      Quick Links

      • Home
      • About Us
      • Hacking & Security
      • Download Custom Kali
      • Contact
      • FAQ

      Services

      • Penetration Testing
      • Consulting
      • Code Review
      • One on one training
      • VPN
      • VIP Membership

      Company

      • About Us
      • Contact
      • Vulnerability Disclosure

      Support

      • FAQ
      • Forums

      Copyright © 2022 Z IT SECURITY LTD t/a zSecurity. All rights reserved.

      • Privacy
      • Shipping
      • Refunds
      • Terms

      Contribute

      Share your knowledge with the world

      SUBMIT AN ARTICLE

      Login with your site account

      Lost your password?

      Not a member yet? Register now

      Register a new account


      Are you a member? Login now

      Enroll in this course to access this lesson!

      All of our courses include:

      ✔ Lifetime, unlimited access to course materials & training videos.

      ✔ Watch online or download lectures for offline use.

      ✔ Verifiable certificate of completion from zSecurity, signed by the course instructor, Zaid.

      ✔ Get answers from our Support Team within a maximum of 15 hours.

      ✔ Unlimited Updates.

      Get free 1 month VIP membership per course with:

      ✔ Live mentorship and Q&A session with the course instructor, Zaid.

      ✔ Instant support from community members through our private discord channel.

      ✔ Daily updates with the latest tutorials & news in the hacking world.

      ✔ Daily resources like CTFs, bug bounty programs, onion services and more!

      ✔ Access our VIP community & connect with like-minded people.

      ✔ Discounts on other zSecurity products and services.

      We are using cookies to give you the best experience on our website. This includes but is not limited to:

      • Storing your settings and preferences.
      • Remember your access information
      • Track website performance and make our website more relevant to you.

      You can find out more about which cookies we are using or switch them off in settings.

      Privacy Overview

      This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

      Strictly Necessary Cookies

      Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

      3rd Party Cookies

      This website uses Google Analytics and Linkedin to collect anonymous information such as the number of visitors to the site, and the most popular pages.

      Keeping this cookies enabled helps us to improve our website.

      Please enable Strictly Necessary Cookies first so that we can save your preferences!

      Powered by  GDPR Cookie Compliance