Skip to content

BridgetIvy/PRODIGY_CS_04

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 
 
 

Repository files navigation

Educational Keylogger | Python Cybersecurity Project

Overview

This project demonstrates how keystroke logging works in a controlled, ethical environment for cybersecurity learning and defensive research purposes.

The application captures user keystrokes in real time, tracks the active window title, formats input cleanly, and securely stores logs using symmetric encryption.

This project is designed strictly for educational use on systems you own or have explicit permission to test.

Features

  • Real-time keystroke capture
  • Active window title tracking (Windows)
  • Clean, readable log formatting
  • Encrypted log storage using Fernet (AES-based symmetric encryption)
  • Visible execution mode (no stealth functionality)
  • ESC key termination control

Technologies Used

  • Python 3
  • pynput (keyboard event listener)
  • pywin32 (Windows API interaction)
  • cryptography (Fernet encryption)

How It Works

  1. The program listens for keyboard events using pynput.
  2. When the active window changes, the window title is logged with a timestamp.
  3. Keystrokes are formatted for readability.
  4. Before being written to disk, log data is encrypted using Fernet symmetric encryption.
  5. Pressing ESC stops logging and saves encrypted data.

Installation

  1. Clone the repository: git clone: https://github.com/BridgetIvy/PRODIGY_CS_04.git

  2. Navigate into the folder: cd PRODIGY_CS_04

  3. Install dependencies: pip install -r requirement.txt

Usage

  1. Run the program: python keylogger.py

  2. Press 'ESC' to terminate logging.

  3. Encrypted loogs will be saved inside the 'logs/' directory.

Project Structure

PRODIGY_CS_04/ │ ├── keylogger.py ├── logs/ ├── requirements.txt ├── README.md └── .gitignore

Security & Ethical Notice

This project is developed strictly for educational and defensive cybersecurity research purposes.

It must only be executed on systems you own or have explicit authorization to test.

Unauthorized use of keylogging software is illegal and unethical.

Learning Outcomes

  • Event-driven programming in Python
  • Keyboard listener implementation
  • Windows API interaction
  • Secure log handling
  • Symmetric encryption fundamentals
  • Ethical awareness in cybersecurity development

Author

Bridget Yisa aspiring cyberseurity Analyst

About

Educational Python keylogger with window title tracking and encrypted log storage (for cybersecurity awareness & research).

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages