Short demo suite that simulates a terminal-based keylogger and a simple detector. Intended for isolated lab use and teaching purposes only.
Safety Notice:
- This repository is an educational simulation. Run it only inside an isolated environment (VM or disposable system).
- Tested on Kali Linux (do not run on production systems).
- No network exfiltration is implemented in this demo, but treat output files as sensitive.
- You are responsible for legal and ethical use.
Requirements
- Python 3.8+ (installed on Kali by default)
Repository layout
malware/keylogger.py: Terminal-based keylogger simulator (educational). Creates demo marker files and a localkeylog_demo.txt.antivirus/detector.py: Simple detector that scans the project folder for known demo signatures and heuristics, generates a console report anddetection_summary.txt.keylog_demo.txt,malware_config.ini,.malware_marker.txt: Demo files created by the keylogger for detection exercises.
Usage Open a terminal in the project root and run one of the following commands.
Run the detector (prompts before scanning):
python3 antivirus/detector.pyRun the keylogger simulator (interactive; press Ctrl+C or type exit to stop):
python3 malware/keylogger.pyNotes:
- The keylogger writes
keylog_demo.txtinside the project folder and creates a marker file.malware_marker.txtfor the detector to find. - The detector uses
os.walkto scan paths listed inSCAN_PATHSand writes adetection_summary.txtfile in the project root.
Modifications
- Comments and docstrings were updated to reference Kali Linux where platform notes existed.
- Any AI-related phrasing was removed or replaced per project owner instructions.
Disclaimer This project is for teaching and demonstration only. Never deploy or test such tools on machines or networks without explicit permission.