-
Notifications
You must be signed in to change notification settings - Fork 155
Open
Description
It is not clear how the keylogging should work. I have successfully injected keystrokes using a payload. But shouldn't I be able to attack a system via Keylogging with or without injecting anything? Just capture the keystrokes.
POC. Send keystrokes to lock the system then keylog the user entering credentials.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels