keyloggers and screenshots can be very potent offensive security tools that enable the attacker to gain information that would be otherwise difficult to obtain.
These tools are able to glean usernames, passwords, and other sensitive information typed by the victim as well as seeing the output of software displayed to the victim such as webpages, internal/proprietary software, word processors, spreadsheet content, and the layout of the user’s desktop.