klog
keystroke injection, HID attacks, USB exploitation.
Load with: use klog
Quick example
use klog
result = keylo("value")
prn(result)
Functions
HID keyboard injection
keylo(device)
Performs the operation. Takes device.
keylo1(h)
Performs the operation. Takes h.
keylo2(h, report)
Performs the operation. Takes h, report.
Key scancodes
keylo3()
Performs the operation.
Type string
keylo4(h, text, delay_ms)
Performs the operation. Takes h, text, delay_ms.
Hotkey combinations
keylo5(h, modifiers, key)
Performs the operation. Takes h, modifiers, key.
Payload drop
keylo6(h, url, filename)
Performs the operation. Takes h, url, filename.
Keylogger detection
keylo7()
Performs the operation.
USB Rubber Ducky payload
keylo8(script_text)
Performs the operation. Takes script_text.
keylo9(h, commands)
Performs the operation. Takes h, commands.
BadUSB payloads
keylo10(url, payload_name)
Performs the operation. Takes url, payload_name.
keylo11(cmd)
Performs the operation. Takes cmd.
keylo12(cmd)
Performs the operation. Takes cmd.
Mouse injection
keylo13(device)
Performs the operation. Takes device.
keylo14(h, x, y)
Performs the operation. Takes h, x, y.
keylo15(h, button)
Performs the operation. Takes h, button.
Keylogger (recording)
keylo16(output_file)
Performs the operation. Takes output_file.
keylo17(h)
Performs the operation. Takes h.
keylo18(h)
Performs the operation. Takes h.
Keystroke fuzzing
keylo19(h, count)
Performs the operation. Takes h, count.
Notes
- Kubernetes-style structured logging.