prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Input Capture:Keylogging | It has used a keylogging tool that records keystrokes in encrypted files. |
Input Capture:Keylogging | It has abused the PasswordChangeNotify to monitor for and capture account password changes. |
Input Capture:Keylogging | It used a Trojan called KEYLIME to capture keystrokes from the victim’s machine. |
Input Capture:Keylogging | It has used tools for capturing keystrokes. |
Input Capture:Keylogging | It used a keylogger called GEARSHIFT on a target system. |
Input Capture:Keylogging | Astaroth logs keystrokes from the victim's machine. |
Input Capture:Keylogging | AsyncRAT can capture keystrokes on the victim’s machine. |
Input Capture:Keylogging | One of Attor's plugins can collect user credentials via capturing keystrokes and can capture keystrokes pressed within the window of the injected process. |
Input Capture:Keylogging | BabyShark has a PowerShell-based remote administration ability that can implement a PowerShell or C# based keylogger. |
Input Capture:Keylogging | When it first starts, BADNEWS spawns a new thread to log keystrokes. |
Input Capture:Keylogging | BadPatch has a keylogging capability. |
Input Capture:Keylogging | Bandook contains keylogging capabilities. |
Input Capture:Keylogging | BISCUIT can capture keystrokes. |
Input Capture:Keylogging | BlackEnergy has run a keylogger plug-in on a victim. |
Input Capture:Keylogging | Cadelspy has the ability to log keystrokes on the compromised host. |
Input Capture:Keylogging | It logs key strokes for configured processes and sends them back to the C2 server. |
Input Capture:Keylogging | Cardinal RAT can log keystrokes. |
Input Capture:Keylogging | Catchamas collects keystrokes from the victim’s machine. |
Input Capture:Keylogging | CHOPSTICK is capable of performing keylogging. |
Input Capture:Keylogging | Clambling can capture keystrokes on a compromised host. |
Input Capture:Keylogging | Cobalt Strike can track key presses with a keylogger module. |
Input Capture:Keylogging | Cobian RAT has a feature to perform keylogging on the victim’s machine. |
Input Capture:Keylogging | CosmicDuke uses a keylogger. |
Input Capture:Keylogging | Crimson can use a module to perform keylogging on compromised hosts. |
Input Capture:Keylogging | Cuba logs keystrokes via polling by using GetKeyState and VkKeyScan functions. |
Input Capture:Keylogging | DarkComet has a keylogging capability. |
Input Capture:Keylogging | It has used a keylogger. |
Input Capture:Keylogging | DarkTortilla can download a keylogging module. |
Input Capture:Keylogging | DarkWatchman can track key presses with a keylogger module. |
Input Capture:Keylogging | Daserf can log keystrokes. |
Input Capture:Keylogging | Derusbi is capable of logging keystrokes. |
Input Capture:Keylogging | DOGCALL is capable of logging keystrokes. |
Input Capture:Keylogging | Dtrack’s dropper contains a keylogging executable. |
Input Capture:Keylogging | Duqu can track key presses with a keylogger module. |
Input Capture:Keylogging | DustySky contains a keylogger. |
Input Capture:Keylogging | ECCENTRICBANDWAGON can capture and store keystrokes. |
Input Capture:Keylogging | Empire includes keylogging capabilities for Windows, Linux, and macOS systems. |
Input Capture:Keylogging | EvilGrab has the capability to capture keystrokes. |
Input Capture:Keylogging | Explosive has leveraged its keylogging capabilities to gain access to administrator accounts on target servers. |
Input Capture:Keylogging | FakeM contains a keylogger module. |
Input Capture:Keylogging | It has logged the keystrokes of victims to escalate privileges. |
Input Capture:Keylogging | It has captured credentials via fake Outlook Web App (OWA) login pages and has also used a .NET based keylogger. |
Input Capture:Keylogging | FlawedAmmyy can collect keyboard events. |
Input Capture:Keylogging | The FunnyDream Keyrecord component can capture keystrokes. |
Input Capture:Keylogging | Fysbis can perform keylogging. |
Input Capture:Keylogging | gh0st RAT has a keylogger. |
Input Capture:Keylogging | Grandoreiro can log keystrokes on the victim's machine. |
Input Capture:Keylogging | GreyEnergy has a module to harvest pressed keystrokes. |
Input Capture:Keylogging | Malware used by It is capable of capturing keystrokes. |
Input Capture:Keylogging | The executable version of Helminth has a module to log keystrokes. |
Input Capture:Keylogging | It has used a PowerShell-based keylogger named kl.ps1. |
Input Capture:Keylogging | HTTPBrowser is capable of capturing keystrokes on victims. |
Input Capture:Keylogging | Imminent Monitor has a keylogging module. |
Input Capture:Keylogging | InvisiMole can capture keystrokes on a compromised host. |
Input Capture:Keylogging | JPIN contains a custom keylogger. |
Input Capture:Keylogging | jRAT has the capability to log keystrokes from the victim’s machine, both offline and online. |
Input Capture:Keylogging | Kasidet has the ability to initiate keylogging. |
Input Capture:Keylogging | It has used keyloggers. |
Input Capture:Keylogging | KeyBoy installs a keylogger for intercepting credentials and keystrokes. |
Input Capture:Keylogging | KGH_SPY can perform keylogging by polling the GetAsyncKeyState() function. |
Input Capture:Keylogging | It has used a PowerShell-based keylogger as well as a tool called MECHANICAL to log keystrokes. |
Input Capture:Keylogging | Kivars has the ability to initiate keylogging on the infected host. |
Input Capture:Keylogging | KONNI has the capability to perform keylogging. |
Input Capture:Keylogging | It malware KiloAlfa contains keylogging functionality. |
Input Capture:Keylogging | Lokibot has the ability to capture input on the compromised host via keylogging. |
Input Capture:Keylogging | It logs keystrokes from the victim’s machine. |
Input Capture:Keylogging | MacMa can use Core Graphics Event Taps to intercept user keystrokes from any text input field and saves them to text files. Text input fields include Spotlight, Finder, Safari, Mail, Messages, and other apps that have text fields for passwords. |
Input Capture:Keylogging | MacSpy captures keystrokes. |
Input Capture:Keylogging | It malware is capable of keylogging. |
Input Capture:Keylogging | MarkiRAT can capture all keystrokes on a compromised host. |
Input Capture:Keylogging | Matryoshka is capable of keylogging. |
Input Capture:Keylogging | It has used key loggers to steal usernames and passwords. |
Input Capture:Keylogging | metaMain has the ability to log keyboard events. |
Input Capture:Keylogging | Metamorfo has a command to launch a keylogger and capture keystrokes on the victim’s machine. |
Input Capture:Keylogging | Micropsia has keylogging capabilities. |
Input Capture:Keylogging | MoonWind has a keylogger. |
Input Capture:Keylogging | NanoCore can perform keylogging on the victim’s machine. |
Input Capture:Keylogging | NavRAT logs the keystrokes on the targeted system. |
Input Capture:Keylogging | NetTraveler contains a keylogger. |
Input Capture:Keylogging | NETWIRE can perform keylogging. |
Input Capture:Keylogging | NightClub can use a plugin for keylogging. |
Input Capture:Keylogging | njRAT is capable of logging keystrokes. |
Input Capture:Keylogging | It has used keylogging tools called KEYPUNCH and LONGWATCH. |
Input Capture:Keylogging | Okrum was seen using a keylogger tool to capture keystrokes. |
Input Capture:Keylogging | During Operation Wocao, threat actors obtained the password for the victim's password manager via a custom keylogger. |
Input Capture:Keylogging | OwaAuth captures and DES-encrypts credentials before writing the username and password to a log file, C:\log.txt. |
Input Capture:Keylogging | PcShare has the ability to capture keystrokes. |
Input Capture:Keylogging | Peppy can log keystrokes on compromised hosts. |
Input Capture:Keylogging | It has used several different keyloggers. |
Input Capture:Keylogging | PlugX has a module for capturing keystrokes per process including window titles. |
Input Capture:Keylogging | PoetRAT has used a Python tool named klog.exe for keylogging. |
Input Capture:Keylogging | PoisonIvy contains a keylogger. |
Input Capture:Keylogging | PoshC2 has modules for keystroke logging and capturing credentials from spoofed Outlook authentication messages. |
Input Capture:Keylogging | PowerLess can use a module to log keystrokes. |
Input Capture:Keylogging | PowerSploit's Get-Keystrokes Exfiltration module can log keystrokes. |
Input Capture:Keylogging | Prikormka contains a keylogger module that collects keystrokes and the titles of foreground windows. |
Input Capture:Keylogging | Proton uses a keylogger to capture keystrokes. |
Input Capture:Keylogging | Pupy uses a keylogger to capture keystrokes it then sends back to the server after it is stopped. |
Input Capture:Keylogging | QakBot can capture keystrokes on a compromised host. |
Input Capture:Keylogging | QuasarRAT has a built-in keylogger. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.