PuZo.org: Ethical Hacking Design An Info Stealer Using Python 3 - PuZo.org

Jump to content

Page 1 of 1
  • You cannot start a new topic
  • You cannot reply to this topic

Ethical Hacking Design An Info Stealer Using Python 3

#1 User is offline   BeMyLove 

  • Addicted to PuZo's
  • PipPipPipPipPip
  • Group: Members
  • Posts: 300638
  • Joined: 04-September 20

Posted 12 May 2024 - 04:05 AM


Posted Image
Last updated 5/2024
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Language: English | Duration: 1h 48m | Size: 882 MB


Learn Python by coding a tool that collects sensitive data from a target computer (keylogger, screenshots, clipboard)
What you'll learn
Python coding and how to build an info stealer that you can use for authorized cybersecurity tests, or for educational purposes
How to code a keylogger, along with code that takes screenshots, and code that copies whatever is stored in the clipboard
How to run the code remotely on a target computer that you have access to via winrs, psexec, or wmic
How to run the code on your local computer
How to run the code on target computers that do not have Python installed
Requirements
No programming experience necessary. I will walk you through every line of code and explain it all.
Description
Hello, My course, "Ethical Hacking: Design an Info Stealer using Python 3" has just been released here in 2024. The way this course works is as follows:I will start at ground zero and show you how to design and build a fully functional "Info Stealer" that can be used on your own computer for educational purposes, or you can use it on remote computers at work, or if you have customers that you are conducting a Red Team exercise for, it can be used there as well. Once we are finished building the tool together, it will perform three functions:1) Keylogging - All keystrokes will be written to local disk, to a UNC path, or to a share.2) - can occur on a time interval that you configure inside the code. They write to local disk, a UNC path, or to a share.3) Clipboard - This works the same way the screenshots do, with a collection occuring on a set time interval and the results get written out to a file locally , or to a UNC path, or to a share.I will explain all the code, so beginners shouldn't worry that much, yet intermediate coders may pick up a few things as well, and besides, the final product is going to be really cool.I will also teach you how to turn your Python code into a single executable file, so that the Python code and all of its dependencies are included. Then when it comes time to run the Python on a target computer, Python doesn't need to be present on that system, and our code will run regardless.Lastly, I will show you some Windows commands that are typically enabled or available on a corporate or government network that uses Microsoft Active Directory (AD). You may be able to use these commands to run your Python code remotely on a target computer if you are part of the same domain and you have "pwned" the proper credentials.
Who this course is for
Anyone interested in building their own ethical hacking tools using the Python 3 programming language. This is the perfect course to start with because it is not overly complicated, but it is very practical.

https://rapidgator.net/file/5e8064a773afc0073b68d3cca076d4f2/Ethical_Hacking_Design_an_Info_Stealer_using_Python_3.rar.html


Share this topic:


Page 1 of 1
  • You cannot start a new topic
  • You cannot reply to this topic