Ethical Hacking: Design an Info Stealer using Python 3
https://www.udemy.com/course/ethical-hacking-design-an-info-stealer-using-python-3
Learn Python by coding a tool that collects sensitive data from a target computer (keylogger, screenshots, clipboard)

 


Hello, My course, "Ethical Hacking:  Design an Info Stealer using Python 3" has just been released here in 2024.  The way this course works is as follows:

I will start at ground zero and show you how to design and build a fully functional "Info Stealer" that can be used on your own computer for educational purposes, or you can use it on remote computers at work, or if you have customers that you are conducting a Red Team exercise for, it can be used there as well. 

Once we are finished building the tool together, it will perform three functions:

1)  Keylogging - All keystrokes will be written to local disk, to a UNC path, or to a share.

2)  Screenshots - Screenshots can occur on a time interval that you configure inside the code.  They write to local disk, a UNC path, or to a share.

3)  Clipboard - This works the same way the screenshots do, with a collection occuring on a set time interval and the results get written out to a file locally , or to a UNC path, or to a share.

I will explain all the code, so beginners shouldn't worry that much, yet intermediate coders may pick up a few things as well, and besides, the final product is going to be really cool.

I will also teach you how to turn your Python code into a single executable file, so that the Python code and all of its dependencies are included.  Then when it comes time to run the Python on a target computer, Python doesn't need to be present on that system, and our code will run regardless.

Lastly, I will show you some Windows commands that are typically enabled or available on a corporate or government network that uses Microsoft Active Directory (AD).  You may be able to use these commands to run your Python code remotely on a target computer if you are part of the same domain and you have "pwned" the proper credentials.

 

Ethical Hacking: Design an Info Stealer using Python 3


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Gamystyle   |  

Information
Members of Guests cannot leave comments.


SermonBox - Seasonal Collection

SermonBox - The Series Pack Collection

Top Rated News

  • Christmas Material
  • Laser Cut & Print Design Elements Bundle - ETSY
  • Daz3D - All Materials - SKU 37000-37999
  • Cgaxis - All Product - 2019 - All Retail! - UPDATED!!!
  • DigitalXModels Full Collections
  • Rampant Design Tools Full Collections Total: $4400
  • FilmLooks.Com Full Collection
  • All PixelSquid Product
  • The Pixel Lab Collection
  • Envato Elements Full Sources- 3200+ Files
  • Ui8.NET Full Sources
  • The History of The 20th Century
  • The Dover Collections
  • Snake Interiors Collections
  • Inspirational Collections
  • Veer Fancy Collections
  • All Ojo Images
  • All ZZVE Collections
  • All Sozaijiten Collections
  • All Image Broker Collections
  • Shuterstock Bundle Collections
  • Tattoo Collections
  • Blend Images Collections
  • Authors Tuorism Collections
  • Motion Mile - Big Bundle
  • PhotoBacks - All Product - 2018
  • Dekes Techniques - Photoshop & Illustrator Course - 1 to 673
Telegram GFXTRA Group
Udemy - Turkce Gorsel Ogrenme Setleri - Part 2
Videohive Wow Pack Series


rss