ilusm.dev

klog

keystroke injection, HID attacks, USB exploitation.

Load with: use klog

Quick example

use klog

result = keylo("value")
prn(result)

Functions

HID keyboard injection

keylo(device)

Performs the operation. Takes device.

keylo1(h)

Performs the operation. Takes h.

keylo2(h, report)

Performs the operation. Takes h, report.

Key scancodes

keylo3()

Performs the operation.

Type string

keylo4(h, text, delay_ms)

Performs the operation. Takes h, text, delay_ms.

Hotkey combinations

keylo5(h, modifiers, key)

Performs the operation. Takes h, modifiers, key.

Payload drop

keylo6(h, url, filename)

Performs the operation. Takes h, url, filename.

Keylogger detection

keylo7()

Performs the operation.

USB Rubber Ducky payload

keylo8(script_text)

Performs the operation. Takes script_text.

keylo9(h, commands)

Performs the operation. Takes h, commands.

BadUSB payloads

keylo10(url, payload_name)

Performs the operation. Takes url, payload_name.

keylo11(cmd)

Performs the operation. Takes cmd.

keylo12(cmd)

Performs the operation. Takes cmd.

Mouse injection

keylo13(device)

Performs the operation. Takes device.

keylo14(h, x, y)

Performs the operation. Takes h, x, y.

keylo15(h, button)

Performs the operation. Takes h, button.

Keylogger (recording)

keylo16(output_file)

Performs the operation. Takes output_file.

keylo17(h)

Performs the operation. Takes h.

keylo18(h)

Performs the operation. Takes h.

Keystroke fuzzing

keylo19(h, count)

Performs the operation. Takes h, count.

Notes

  • Kubernetes-style structured logging.