Defeat any keylogger in 5 steps!!

lakshay arora
2 min readAug 9, 2020

Today I’ll discuss about a cool tool named KeyScrambler, that claims to defeat any keylogger by obfuscating the input given by the user before it gets hooked by the Windows MSDN Api’s and then de-obfuscates it whenever any other utility like text editor requires it. All this functioning(encryption) occurs at kernel level, thus this tool requires administrative privileges.

Key Scrambler Display

Step 1. First of all download and install the tool KeyScrambler.
https://www.majorgeeks.com/files/details/keyscrambler.html

Step 2. Now after downloading, install it and after complete installation, you have to reboot your system.

Step 3. Now when your computer boots up, right click on the icon of KeyScrambler in the system tray at the bottom of a screen.

Step 4. Now choose options from there and Keyscrambler will open

Step 5. Now you can alter settings in this according to your wish and after that simply click on ok. Now your key scrambler app is ready, open your browser and type anything you can see that your keystrokes are being encrypted.

Benefits of this tool:

1) The tool utilizes both standard symmetric-key encryption (Blowfish 128-bit) and asymmetric-key encryption (RSA 1024-bit) for strong protection.

2) Data Security and privacy is duly taken care off.

3) It can’t be turned off by malware easily( like all AV products as they have kernel level privileges)

My Experience with this tool:

This tool is in continuous development phase and regular updates are frequently done, so that it’s compatibility with the other commercial utilities and security software is increased. The computational overhead that I saw was a mere 2.8% on memory(8GB) when running in the background. Sometimes this tool gets detected by Anti-Malware products for its suspicious behavior but that’s only due to it’s kernel level hooking and encryption reasons. Otherwise, I didn’t observe any suspicious malware dropping, hollowing or other network behavior. Another aspect of this tool is that its completely closed source and one can not view its source code, thus we don’t know what Microsoft API’s it uses and what is the control flow of data.(We may debug and extract this information but its illegal and cannot be discussed)

--

--

lakshay arora

Hi! I am a B.Tech student, whose enjoys reverse engineering and digital forensics. I relish reading anything and everything about cybersecurity.