Version: 1.0.0
License: MIT
Platforms: Windows 10/11 (Full Support), Linux (Partial Support)
Language: Python 3.8+
SysCreep is a modular, stealth-capable system reconnaissance and profiling tool designed for Windows and Linux environments. It enables ethical hackers, penetration testers, forensic analysts, and cybersecurity researchers to collect detailed system, network, and user-level data in a silent and extensible manner.
Built with Python, SysCreep offers a plug-and-play architecture, multiple execution modes, and a rich set of modules for passive data extraction.
✔ Modular architecture — each module is independent and extendable
✔ Full system profiling — OS, CPU, RAM, disk, user, uptime
✔ Network intelligence — IP, MAC, active connections, Wi-Fi credentials
✔ Process monitoring — running processes, memory usage
✔ Clipboard dump — extract current clipboard content
✔ Screenshot capture — silent screen grab
✔ Optional keylogger — logs keystrokes (disabled by default)
✔ Stealth mode — runs silently without console output
✔ Log mode — structured output for forensic analysis
✔ Cross-platform support — Windows (full), Linux (partial)
| Module | Purpose | OS Support |
|---|---|---|
| system_info.py | OS, CPU, RAM, user, uptime | Win/Linux |
| network_info.py | IP, MAC, hostname, active connections | Win/Linux |
| disk_info.py | Disk partitions, usage, file system types | Win/Linux |
| process_info.py | Running processes, PID, memory usage | Win/Linux |
| screenshot.py | Capture screen using pyautogui | Win/Linux |
| keylogger.py | Log keystrokes (requires admin) | Win/Linux |
All modules implement a run() function and can be executed independently.
SysCreep supports multiple modes of operation:
-
Full Scan Mode
→ Executes all available modules for comprehensive profiling -
Custom Mode
→ User selects specific modules to run -
Stealth Mode
→ Executes silently without console output or visible windows -
Log Mode
→ Saves output to structured log files for later analysis
✔ Windows 10 / 11 — Full support
✔ Linux (Debian/Ubuntu) — Partial support
-
Python 3.8+
-
Libraries:
- psutil — system and process utilities
- socket, platform — system metadata
- pywifi — Wi-Fi credential access (Windows only)
- pyautogui — screenshot functionality
- keyboard — keylogging (optional, Windows only)
- os, subprocess, time — core operations
-
Architecture:
- Modular design
- CLI-based interface
- Extensible module registry
SysCreep is a dual-use tool intended for:
✔ Ethical hacking
✔ Cybersecurity education
✔ Malware analysis (in sandboxed environments)
Use responsibly. Always obtain explicit permission before deploying SysCreep.
MIT License
Copyright (c) 2025 Coffee Code Box
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
CoffeeCodeBox https://github.com/CoffeeCodeBox
Amir Mahdi Barati https://github.com/Amir-Mahdi-Barati
Mohammadreza Sadeghi https://github.com/devmrsad
- Penetration Testing
- Red Team Operations
- Cybersecurity Education
- Digital Forensics
- Malware Analysis
- System Diagnostics
Pull requests are welcome! Fork the repo, add your module, and submit a PR.
For feature requests, bug reports, or collaboration ideas, open an issue.
SysCreep is a powerful tool for professionals and learners alike.
Use it wisely. Stay ethical. Keep exploring.