prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Input Capture:Keylogging | Fysbis can perform keylogging. |
Input Capture:Keylogging | gh0st RAT has a keylogger. |
Input Capture:Keylogging | Grandoreiro can log keystrokes on the victim's machine. |
Input Capture:Keylogging | GreyEnergy has a module to harvest pressed keystrokes. |
Input Capture:Keylogging | Malware used by It is capable of capturing keystrokes. |
Input Capture:Keylogging | The executable version of Helminth has a module to log keystrokes. |
Input Capture:Keylogging | It has used a PowerShell-based keylogger named kl.ps1. |
Input Capture:Keylogging | HTTPBrowser is capable of capturing keystrokes on victims. |
Input Capture:Keylogging | Imminent Monitor has a keylogging module. |
Input Capture:Keylogging | InvisiMole can capture keystrokes on a compromised host. |
Input Capture:Keylogging | JPIN contains a custom keylogger. |
Input Capture:Keylogging | jRAT has the capability to log keystrokes from the victim’s machine, both offline and online. |
Input Capture:Keylogging | Kasidet has the ability to initiate keylogging. |
Input Capture:Keylogging | It has used keyloggers. |
Input Capture:Keylogging | KeyBoy installs a keylogger for intercepting credentials and keystrokes. |
Input Capture:Keylogging | KGH_SPY can perform keylogging by polling the GetAsyncKeyState() function. |
Input Capture:Keylogging | It has used a PowerShell-based keylogger as well as a tool called MECHANICAL to log keystrokes. |
Input Capture:Keylogging | Kivars has the ability to initiate keylogging on the infected host. |
Input Capture:Keylogging | KONNI has the capability to perform keylogging. |
Input Capture:Keylogging | It malware KiloAlfa contains keylogging functionality. |
Input Capture:Keylogging | Lokibot has the ability to capture input on the compromised host via keylogging. |
Input Capture:Keylogging | It logs keystrokes from the victim’s machine. |
Input Capture:Keylogging | MacMa can use Core Graphics Event Taps to intercept user keystrokes from any text input field and saves them to text files. Text input fields include Spotlight, Finder, Safari, Mail, Messages, and other apps that have text fields for passwords. |
Input Capture:Keylogging | MacSpy captures keystrokes. |
Input Capture:Keylogging | It malware is capable of keylogging. |
Input Capture:Keylogging | MarkiRAT can capture all keystrokes on a compromised host. |
Input Capture:Keylogging | Matryoshka is capable of keylogging. |
Input Capture:Keylogging | It has used key loggers to steal usernames and passwords. |
Input Capture:Keylogging | metaMain has the ability to log keyboard events. |
Input Capture:Keylogging | Metamorfo has a command to launch a keylogger and capture keystrokes on the victim’s machine. |
Input Capture:Keylogging | Micropsia has keylogging capabilities. |
Input Capture:Keylogging | MoonWind has a keylogger. |
Input Capture:Keylogging | NanoCore can perform keylogging on the victim’s machine. |
Input Capture:Keylogging | NavRAT logs the keystrokes on the targeted system. |
Input Capture:Keylogging | NetTraveler contains a keylogger. |
Input Capture:Keylogging | NETWIRE can perform keylogging. |
Input Capture:Keylogging | NightClub can use a plugin for keylogging. |
Input Capture:Keylogging | njRAT is capable of logging keystrokes. |
Input Capture:Keylogging | It has used keylogging tools called KEYPUNCH and LONGWATCH. |
Input Capture:Keylogging | Okrum was seen using a keylogger tool to capture keystrokes. |
Input Capture:Keylogging | During Operation Wocao, threat actors obtained the password for the victim's password manager via a custom keylogger. |
Input Capture:Keylogging | OwaAuth captures and DES-encrypts credentials before writing the username and password to a log file, C:\log.txt. |
Input Capture:Keylogging | PcShare has the ability to capture keystrokes. |
Input Capture:Keylogging | Peppy can log keystrokes on compromised hosts. |
Input Capture:Keylogging | It has used several different keyloggers. |
Input Capture:Keylogging | PlugX has a module for capturing keystrokes per process including window titles. |
Input Capture:Keylogging | PoetRAT has used a Python tool named klog.exe for keylogging. |
Input Capture:Keylogging | PoisonIvy contains a keylogger. |
Input Capture:Keylogging | PoshC2 has modules for keystroke logging and capturing credentials from spoofed Outlook authentication messages. |
Input Capture:Keylogging | PowerLess can use a module to log keystrokes. |
Input Capture:Keylogging | PowerSploit's Get-Keystrokes Exfiltration module can log keystrokes. |
Input Capture:Keylogging | Prikormka contains a keylogger module that collects keystrokes and the titles of foreground windows. |
Input Capture:Keylogging | Proton uses a keylogger to capture keystrokes. |
Input Capture:Keylogging | Pupy uses a keylogger to capture keystrokes it then sends back to the server after it is stopped. |
Input Capture:Keylogging | QakBot can capture keystrokes on a compromised host. |
Input Capture:Keylogging | QuasarRAT has a built-in keylogger. |
Input Capture:Keylogging | RCSession has the ability to capture keystrokes on a compromised host. |
Input Capture:Keylogging | Regin contains a keylogger. |
Input Capture:Keylogging | Remcos has a command for keylogging. |
Input Capture:Keylogging | Remexi gathers and exfiltrates keystrokes from the machine. |
Input Capture:Keylogging | Remsec contains a keylogger component. |
Input Capture:Keylogging | Revenge RAT has a plugin for keylogging. |
Input Capture:Keylogging | ROKRAT can use SetWindowsHookEx and GetKeyNameText to capture keystrokes. |
Input Capture:Keylogging | Rover has keylogging functionality. |
Input Capture:Keylogging | It can record keystrokes from both the keyboard and virtual keyboard. |
Input Capture:Keylogging | RunningRAT captures keystrokes and sends them back to the C2 server. |
Input Capture:Keylogging | It has used a keylogger to capture keystrokes by using the SetWindowsHookEx function. |
Input Capture:Keylogging | SILENTTRINITY has a keylogging capability. |
Input Capture:Keylogging | SLOTHFULMEDIA has a keylogging capability. |
Input Capture:Keylogging | SMOKEDHAM can continuously capture keystrokes. |
Input Capture:Keylogging | It has used keylogging tools. |
Input Capture:Keylogging | SslMM creates a new thread implementing a keylogging facility using Windows Keyboard Accelerators. |
Input Capture:Keylogging | Sykipot contains keylogging functionality to steal passwords. |
Input Capture:Keylogging | TajMahal has the ability to capture keystrokes on an infected host. |
Input Capture:Keylogging | ThiefQuest uses the CGEventTap functions to perform keylogging. |
Input Capture:Keylogging | It actors installed a credential logger on Microsoft Exchange servers. It also leveraged the reconnaissance framework, ScanBox, to capture keystrokes. |
Input Capture:Keylogging | TinyZBot contains keylogger functionality. |
Input Capture:Keylogging | It has used keylogging tools in their operations. |
Input Capture:Keylogging | Trojan.Karagany can capture keystrokes on a compromised host. |
Input Capture:Keylogging | Unknown Logger is capable of recording keystrokes. |
Input Capture:Keylogging | VERMIN collects keystrokes from the victim machine. |
Input Capture:Keylogging | WarzoneRAT has the capability to install a live and offline keylogger, including through the use of the GetAsyncKeyState Windows API. |
Input Capture:Keylogging | XAgentOSX contains keylogging functionality that will monitor for active application windows and write them to the log, it can handle special characters, and it will buffer by default 50 characters before sending them out over the C2 infrastructure. |
Input Capture:Keylogging | yty uses a keylogger plugin to gather keystrokes. |
Input Capture:Keylogging | Zeus Panda can perform keylogging on the victim’s machine by hooking the functions TranslateMessage and WM_KEYDOWN. |
Input Capture:Keylogging | ZxShell has a feature to capture a remote computer's keystrokes using a keylogger. |
Input Capture:GUI Input Capture | Bundlore prompts the user for their credentials. |
Input Capture:GUI Input Capture | Calisto presents an input prompt asking for the user's login and password. |
Input Capture:GUI Input Capture | Dok prompts the user for credentials. |
Input Capture:GUI Input Capture | It has presented victims with spoofed Windows Authentication prompts to collect their credentials. |
Input Capture:GUI Input Capture | iKitten prompts the user for their credentials. |
Input Capture:GUI Input Capture | Keydnap prompts the users for credentials. |
Input Capture:GUI Input Capture | Metamorfo has displayed fake forms on top of banking sites to intercept credentials from victims. |
Input Capture:GUI Input Capture | Proton prompts users for their credentials. |
Input Capture:GUI Input Capture | SILENTTRINITY's credphisher.py module can prompt a current user for their credentials. |
Input Capture:GUI Input Capture | XCSSET prompts the user to input credentials using a native macOS dialog box leveraging the system process /Applications/Safari.app/Contents/MacOS/SafariForWebKitDevelopment. |
Input Capture:Web Portal Capture | The IceApple OWA credential logger can monitor for OWA authentication requests and log the credentials. |
Input Capture:Credential API Hooking | Carberp has hooked several Windows API functions to steal credentials. |
Input Capture:Credential API Hooking | Empire contains some modules that leverage API hooking to carry out tasks, such as netripper. |
Input Capture:Credential API Hooking | FinFisher hooks processes by modifying IAT pointers to CreateWindowEx. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.