DuckCpp
xkbcat
Our great sponsors
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
DuckCpp
xkbcat
-
Generals.io – Capture enemy generals to defeat them
Yes, approximately. In X11 at least, the hardware codes are called keycodes, and the human readable names are called keysyms. Example ofuse of the XkbKeycodeToKeysym function in use: https://github.com/anko/xkbcat/blob/8abc3402cb679027a3bd0313...
Keysyms don't necessarily strictly match "key location"; keyboards are allowed to output whatever codes they want for whatever key they want (see e.g. QMK firmware; often used in custom keyboards to do complex conditional key remapping), but they're relatively consistent between common keys on most keyboards, and consistent on the same keyboard even if you switch keyboard layouts in software, or have some custom firmware which functionality is stateful.
-
Red Hat Enterprise Linux 10 Plans for Wayland and Xorg Server
>I don't know a single person that has ever fallen victim to a virus or malware on linux, and I've been using it almost exclusively for the past 20 years. If it was a threat vector, it clearly wasn't a very big issue.
So: no true Linux user succumbs to malwares and no true Scotsman puts sugar on his porridge.
Putting that aside, it doesn't take much effort to find an example of X11 keylogger that requires zero superuser privilege and zero explicit permission granting by the user. Here, the first result from DDGing "x11 keylogger": https://github.com/anko/xkbcat
It is hard to believe this has not occurred in the wild. If such attack really hasn't occurred before in the Linux world, I would rather use the unpopularity of Linux desktop as my justification.
- I keylogger su linux necessitano il super user?
-
do you run an Anti Virus on your Linux system?
i think you’re misunderstanding what a virus is or what it is a capable of. sudo (just like every other piece of software) can be exploited, which would allow anything (such as a malicious program) to get root privilege with no user input. there are also plenty of other approaches for viruses to take that wouldn’t require root, like X11 keylogging, and user namespace exploits just to name a few. being selective with what you run with sudo can help a lot don’t get me wrong, but it definitely isn’t some silver bullet. think of it like how windows can get malware without ever running something as administrator
- Tray icons missing
-
What are the benefit(s) of using Wayland over Xorg?
For now, the focus is getting Wayland on par with Xorg. However, there are a number of infrastructure improvements behind the scenes that make it superior to Xorg. For example, applications can no longer silently capture keystrokes without elevated privileges. Demo.
-
Anyone using obs in kde wayland ?
It's a bit more complicated than that, but essentially yes, see e.g. xkbcat and some other of the keyloggers linked there.
- There is no noticeable difference between X11 and Wayland
-
Fedora 34 Gnome 40 Wayland vs X11
Here's a keylogger i found while googling: https://github.com/anko/xkbcat
-
Secure way to run a proprietary software?
X11 provides no mechanism for keeping applications from reading potentially sensitive input. Consider this simple, 100-line program to log keystrokes, and consider what Zoom might be doing with this kind of power.
What are some alternatives?
aegis - Linux, FreeBSD, NetBSD, OpenBSD and Windows debugging detection library. With support for C and Go.
Keylogger - A simple keylogger for Windows, Linux and Mac