Ethical Hacking: Design an Info Stealer using Python 3
Ethical Hacking: Design an Info Stealer using Python 3, Learn Python by coding a tool that collects sensitive data from a target computer (keylogger, screenshots, clipboard).
Course Description
Hello, My course, “Ethical Hacking:  Design an Info Stealer using Python 3” has just been released here in 2024. The way this course works is as follows:
I will start at ground zero and show you how to design and build a fully functional “Info Stealer” that can be used on your own computer for educational purposes, or you can use it on remote computers at work, or if you have customers that you are conducting a Red Team exercise for, it can be used there as well.
Once we are finished building the tool together, it will perform three functions:
1)Â Â Keylogging – All keystrokes will be written to local disk, to a UNC path, or to a share.
2) Screenshots – Screenshots can occur on a time interval that you configure inside the code. They write to local disk, a UNC path, or to a share.
3)Â Â Clipboard – This works the same way the screenshots do, with a collection occuring on a set time interval and the results get written out to a file locally , or to a UNCÂ path, or to a share.
IÂ will explain all the code, so beginners shouldn’t worry that much, yet intermediate coders may pick up a few things as well, and besides, the final product is going to be really cool.
I will also teach you how to turn your Python code into a single executable file, so that the Python code and all of its dependencies are included. Then when it comes time to run the Python on a target computer, Python doesn’t need to be present on that system, and our code will run regardless.
Lastly, I will show you some Windows commands that are typically enabled or available on a corporate or government network that uses Microsoft Active Directory (AD). You may be able to use these commands to run your Python code remotely on a target computer if you are part of the same domain and you have “pwned” the proper credentials.