Ethical Hacking: Design an Info Stealer using Python 3 | Udemy


Ethical Hacking: Design an Info Stealer using Python 3 | Udemy
English | Size: 891.5 MB
Genre: eLearning

Learn Python by coding a tool that collects sensitive data from a target computer (keylogger, screenshots, clipboard)

What you’ll learn
Python coding and how to build an info stealer that you can use for authorized cybersecurity tests, or for educational purposes
How to code a keylogger, along with code that takes screenshots, and code that copies whatever is stored in the clipboard
How to run the code remotely on a target computer that you have access to via winrs, psexec, or wmic
How to run the code on your local computer
How to run the code on target computers that do not have Python installed

Hello, My course, “Ethical Hacking: Design an Info Stealer using Python 3” has just been released here in 2024. The way this course works is as follows:

I will start at ground zero and show you how to design and build a fully functional “Info Stealer” that can be used on your own computer for educational purposes, or you can use it on remote computers at work, or if you have customers that you are conducting a Red Team exercise for, it can be used there as well.

Once we are finished building the tool together, it will perform three functions:

1) Keylogging – All keystrokes will be written to local disk, to a UNC path, or to a share.

2) Screenshots – Screenshots can occur on a time interval that you configure inside the code. They write to local disk, a UNC path, or to a share.

3) Clipboard – This works the same way the screenshots do, with a collection occuring on a set time interval and the results get written out to a file locally , or to a UNC path, or to a share.

I will explain all the code, so beginners shouldn’t worry that much, yet intermediate coders may pick up a few things as well, and besides, the final product is going to be really cool.

I will also teach you how to turn your Python code into a single executable file, so that the Python code and all of its dependencies are included. Then when it comes time to run the Python on a target computer, Python doesn’t need to be present on that system, and our code will run regardless.

Lastly, I will show you some Windows commands that are typically enabled or available on a corporate or government network that uses Microsoft Active Directory (AD). You may be able to use these commands to run your Python code remotely on a target computer if you are part of the same domain and you have “pwned” the proper credentials.

Who this course is for:
Anyone interested in building their own ethical hacking tools using the Python 3 programming language. This is the perfect course to start with because it is not overly complicated, but it is very practical.

DOWNLOAD FROM RAPIDGATOR

rapidgator.net/file/658b1f1823ac5307daa61dd009057e36/Ethical-Hacking-Design-an-Info-Stealer-using-Python-3.part1.rar.html
rapidgator.net/file/1b0baf88bda154a06483284efbd06ebd/Ethical-Hacking-Design-an-Info-Stealer-using-Python-3.part2.rar.html
rapidgator.net/file/ed1295c2646c1d0f252746d8dcf43c5e/Ethical-Hacking-Design-an-Info-Stealer-using-Python-3.part3.rar.html

DOWNLOAD FROM TURBOBIT

tbit.to/81fr1u1wm428/Ethical-Hacking-Design-an-Info-Stealer-using-Python-3.part1.rar.html
tbit.to/d5hshny9evni/Ethical-Hacking-Design-an-Info-Stealer-using-Python-3.part2.rar.html
tbit.to/wxamkspt15wf/Ethical-Hacking-Design-an-Info-Stealer-using-Python-3.part3.rar.html

If any links die or problem unrar, send request to
forms.gle/e557HbjJ5vatekDV9

Leave a Comment