keylogger-architecture
CommunityAnalyze low-level keylogger techniques.
Software Engineering#security research#malware analysis#keylogger#kernel driver#EDR evasion#input capture
AuthorSnailSploit
Version1.0.0
Installs0
System Documentation
What problem does it solve?
This Skill provides a deep dive into the architecture and implementation of low-level keyloggers, detailing various methods of input capture and their associated Indicators of Compromise (IOCs).
Core Features & Use Cases
- Input Capture Methods: Explains kernel driver hooks (WH_KEYBOARD_LL, SetWindowsHookEx), ETW-based capture, and raw input registration.
- Stealth & Evasion: Discusses user-mode vs. kernel-mode approaches and stealth techniques.
- IOC Analysis: Details potential detection vectors for each method.
- Use Case: Understand how sophisticated keyloggers operate to better defend against them or to research malware techniques.
Quick Start
Analyze the kernel driver hooks used in low-level keylogger architectures.
Dependency Matrix
Required Modules
None requiredComponents
references
💻 Claude Code Installation
Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.
Please help me install this Skill: Name: keylogger-architecture Download link: https://github.com/SnailSploit/Claude-Red/archive/main.zip#keylogger-architecture Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
Agent Skills Search Helper
Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.