Warning! Python Remote Keylogger (this is really too easy!)

แชร์
ฝัง
  • เผยแพร่เมื่อ 28 ก.ย. 2024

ความคิดเห็น • 419

  • @davidbombal
    @davidbombal  2 ปีที่แล้ว +10

    Create your own virtual machine on Linode with a 60-day $100 credit: davidbombal.wiki/linode
    If that link doesn't work for you, try this link: www.linode.com/lp/youtube-viewers/?ifso=davidbombal
    Please note: Credits expire in 60 days. Big thanks to Linode for sponsoring this video!
    I wrote a Python program that saves keystrokes to a cloud server. I compiled the script to run on a Windows 11 computer with anti-virus enabled. May this be a warning to both you and your family. Don't download software that you don't trust. Only download software from reputable software developers and those you trust.
    Disclaimer: This video is for educational purposes only. I own all equipment used for this demonstration. No actual attack took place.
    // MENU //
    00:00 - Be careful what you download
    00:07 - Intro
    00:16 - How to capture keystrokes with Python
    00:41 - Keylogger demo
    03:30 - How to setup the keylogger
    10:34 - Conclusion
    // Code //
    Keylogger: github.com/davidbombal/python-keylogger
    Server: github.com/davidbombal/express-server-basic
    // Video mentioned //
    Python keylogger bypasses Windows 11 Defender: th-cam.com/video/qaZ-IbssPDI/w-d-xo.html
    // SOCIAL //
    Discord: discord.com/invite/usKSyzb
    Twitter: twitter.com/davidbombal
    Instagram: instagram.com/davidbombal
    LinkedIn: www.linkedin.com/in/davidbombal
    Facebook: facebook.com/davidbombal.co
    TikTok: tiktok.com/@davidbombal
    TH-cam: th-cam.com/users/davidbombal
    // SPONSORS //
    Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
    Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

    • @-nary-zy5jt
      @-nary-zy5jt 2 ปีที่แล้ว

      Dear David, I'm telling your her 🖐🏻😡.

    • @duckyblenderold
      @duckyblenderold 2 ปีที่แล้ว

      i think you forgot to pin this

    • @gtxgamer5025
      @gtxgamer5025 ปีที่แล้ว

      But what if I don't have a python download??

  • @codewithgabriel4626
    @codewithgabriel4626 2 ปีที่แล้ว +6

    This is awesome, it's more effective If the keylogger run as a daemon in the background and it is start running on system boot up

    • @davidbombal
      @davidbombal  2 ปีที่แล้ว +8

      This is only a proof of concept and can improved in many ways. We didn't show everything here because of TH-cam rule.

    • @JB-fh1bb
      @JB-fh1bb 2 ปีที่แล้ว

      @@davidbombal Now I’m curious: what didn’t you show (besides compile steps)?

    • @rabblegaming4815
      @rabblegaming4815 8 หลายเดือนก่อน

      ​@@davidbombalWhere can I learn and see everything, I am into python development. How do people like you learn? Everything nowadays is hidden either for going into courses and spending money or just people not to see and analise.

  • @Spitfire_Cowboy
    @Spitfire_Cowboy 2 ปีที่แล้ว +9

    Rather than outputting to a text file, you could use a nosql db and output the processes running at the time of the key logging to have a better picture of what the target is using at the time they are typing.

    • @davidbombal
      @davidbombal  2 ปีที่แล้ว +12

      We decided against doing that here to keep things simple. This is a proof of concept and can be improved in many ways. We can code in many other options, but this is for educational purposes only and not to build malware.

    • @Spitfire_Cowboy
      @Spitfire_Cowboy 2 ปีที่แล้ว +3

      @@davidbombal agreed. I actually like the simple poc. It leaves alot of potential open that could be touched on or brainstormed or discussed in general. Especially if talking about major nation state adversaries and their toolsets to gain access to sensitive western critical infrastructure systems. Or general minor ransomware criminal groups with their initial access brokers.

  • @djamarildo2010
    @djamarildo2010 2 ปีที่แล้ว +4

    Amazing content David I like that you bring us the best reputable personalities in their speciality field so we can learn from the best no need for fancy botcamps😄 ✅🖥️🙏

  • @aleksalukic1904
    @aleksalukic1904 2 ปีที่แล้ว +1

    I started to smile after I saw the first thumbnail of this video. It was like Saurons Eye from the Lord of the Rings is watching you. And now it's like a Ringwraith.

  • @mr.smithsmith71
    @mr.smithsmith71 2 ปีที่แล้ว +4

    what about how to stop remote keyloggers? what antivirus or app can detect them?

  • @nachosncheez2492
    @nachosncheez2492 2 ปีที่แล้ว +1

    Nice video, if i was do it this i would use sockets for real time communication and a common port such as 443 + inject a binary blob into memory for a listener to setup a shell, that the program can load using a pointer. easy web c&c.

  • @morleytechtv7749
    @morleytechtv7749 2 ปีที่แล้ว +2

    Windows Defender can detect it now,

  • @markc6714
    @markc6714 2 ปีที่แล้ว +2

    The problem with spying on your partner is sometimes you find out something you wish you didn't

    • @0xMalWorld
      @0xMalWorld 2 ปีที่แล้ว +1

      yeah, that's a risk... But imao it worth it

  • @sreyneatdet6346
    @sreyneatdet6346 2 ปีที่แล้ว +5

    Someone said this virus is undetectable ! So funny maybe they are recently using windows 7 !

  • @Mysterykingdom
    @Mysterykingdom ปีที่แล้ว

    How would you detect this

  • @technoman9926
    @technoman9926 2 ปีที่แล้ว +1

    Please make video on Android keylogger

  • @mohamednarhmouche364
    @mohamednarhmouche364 2 ปีที่แล้ว +1

    if you want you can also create a python scripting course on youtube

  • @Marie-j8k
    @Marie-j8k หลายเดือนก่อน

    What do you recommend for someone who has remote keylogger (victim) on their computer and wants to remove it? Many thanks

  • @loficafechill
    @loficafechill 2 ปีที่แล้ว +1

    in other words this can also bypass a separate firewall? wow this is crazy stuff.

  • @millymichael4701
    @millymichael4701 2 ปีที่แล้ว +1

    David, you said you were going to show us how to capture a handshake with Kali Linux installed on our android phones.

    • @jesseclutterbuck6617
      @jesseclutterbuck6617 2 ปีที่แล้ว

      you cant. android dosnt surport monator mode also you need to send a deauth packet to the target to catch the handshake. and the handshake uses encryption. use a laptop and a 64bit version of kali

  • @razashah2611
    @razashah2611 2 ปีที่แล้ว +1

    More videos like this but easy one's please for beginners.

  • @kuntrasha
    @kuntrasha 8 หลายเดือนก่อน

    I am ok with python code but I have no idea about C code. When you say you used a C compiler to compile it does that mean you can compile python code in C compilers or did you have to use C code to make it work? Thanks for the video.

  • @yasashikunizam1311
    @yasashikunizam1311 2 ปีที่แล้ว

    what if we run this file as a script on the AD .... and it will automatically run right? fun but scarry ...

  • @shreyas_._
    @shreyas_._ 2 ปีที่แล้ว

    Literally me watching this on vanced

  • @accountoneripley7631
    @accountoneripley7631 ปีที่แล้ว

    Hello, what program do you use to record the windows desktop?

  • @h.fontanez5453
    @h.fontanez5453 2 ปีที่แล้ว +1

    The question is: how is this prevented?
    I like to see the responses for both; Enterprise level and single host.

    • @EraYaN
      @EraYaN 2 ปีที่แล้ว +1

      With custom (targeted) stuff like this, honestly you don’t. Only chance is before it’s executed.

    • @catatafish22
      @catatafish22 2 ปีที่แล้ว +4

      Don’t open applications from untrusted sources

    • @h.fontanez5453
      @h.fontanez5453 2 ปีที่แล้ว

      HIPS , Allow list with hashes comes to mind. Would these be good options?

    • @PySnek
      @PySnek 2 ปีที่แล้ว

      Windows would block the execution and you'd have to allow it first. It's not that easy anymore since Win10.

  • @PandaBero83
    @PandaBero83 2 ปีที่แล้ว

    Thanks for the nice scripting..
    but i am curious.. Did you find some concerned keystrokes on you'r wife's computer???

  • @aniketsharma7333
    @aniketsharma7333 2 ปีที่แล้ว +1

    Great video sir :)

  • @sithumgimhan7650
    @sithumgimhan7650 5 หลายเดือนก่อน

    Does this detectable in a mcAfee endpoint security

  • @youdummy5928
    @youdummy5928 2 ปีที่แล้ว

    this script is getting detected in my computer(windows 11) and automatically being deleted in vs code after saving showing the warning that this file contains virus

  • @kekeke7815
    @kekeke7815 2 ปีที่แล้ว

    Are the sample softs there when you open the software or do you have to download them from sowhere

  • @mahendrasharma4041
    @mahendrasharma4041 2 ปีที่แล้ว +1

    i m from india ....your content is great ...... really

  • @New-qg3zj
    @New-qg3zj 2 ปีที่แล้ว

    How to prevent Android mobile getting attacked by spy ware.
    How to know if the mobile is comprised by spyware

  • @colinrogers9927
    @colinrogers9927 2 ปีที่แล้ว

    Awesome. Well done sir

  • @martinsmatthew4983
    @martinsmatthew4983 ปีที่แล้ว

    Worked , thanks a lot!

  • @technip7378
    @technip7378 2 ปีที่แล้ว +1

    Big fan

  • @p.m.8316
    @p.m.8316 7 หลายเดือนก่อน

    What happens if a user is offline? will the keystrokes appear when he is online again?

  • @anandu6859
    @anandu6859 2 ปีที่แล้ว +1

    Laughing in wayland

  • @the-mad-scientist-
    @the-mad-scientist- ปีที่แล้ว

    I attempted to do this using AWS cloud server... same ubuntu server and was partly successful. However I am getting this error when trying to start up the server Error: Cannot find module 'express'
    Require stack:
    - /home/ubuntu/express-server-basic/server.js
    at Function.Module._resolveFilename (internal/modules/cjs/loader.js:815:15)
    at Function.Module._load (internal/modules/cjs/loader.js:667:27)
    at Module.require (internal/modules/cjs/loader.js:887:19)
    at require (internal/modules/cjs/helpers.js:74:18)
    at Object. (/home/ubuntu/express-server-basic/server.js:3:17)
    at Module._compile (internal/modules/cjs/loader.js:999:30)
    at Object.Module._extensions..js (internal/modules/cjs/loader.js:1027:10)
    at Module.load (internal/modules/cjs/loader.js:863:32)
    at Function.Module._load (internal/modules/cjs/loader.js:708:14)
    at Function.executeUserEntryPoint [as runMain] (internal/modules/run_main.js:60:12) {
    code: 'MODULE_NOT_FOUND',
    requireStack: [ '/home/ubuntu/express-server-basic/server.js' ]

  • @k98killer
    @k98killer 2 ปีที่แล้ว +3

    Reminds me of some of my earliest experiments in writing my own penetration tools. The logger I wrote worked poorly and only locally on my own computer. Hilariously bad but still somewhat functional. The more fun experiments were controlling pointers remotely. Good times.

  • @NoobosaurusR3x
    @NoobosaurusR3x 2 ปีที่แล้ว +1

    Heya David. Nice video, as usual :)
    I have a small question though. Why is windows Defender not picking up the exe file ?
    It usually picks up python scripts quite easily and the library you did use, is using winapi and that is not even trying to evade detection.
    Could you explain, please ? :)

    • @catatafish22
      @catatafish22 2 ปีที่แล้ว +9

      He couldn’t explain the specifics due to legal reasons (cos then he’d literally be telling us how to install malicious scripts on someone’s computer in a yt vid)… but from what I gathered, he was able to bypass windows defender because the program was made using a C+ compiler. C+ is native to windows, so windows defender does not recognise it as being malicious… a python installer is embedded in the program, along with a keylogger written in python. A sneaky and very simple way of beating the firewall. You’ll be able to see how it’s done if you look at the code in the program he built.

    • @NoobosaurusR3x
      @NoobosaurusR3x 2 ปีที่แล้ว

      @@catatafish22 I did look at the code :)
      That's why I came to ask the question here. I was wondering if it was the kinda double compiling he was talking about but, really, I don't get why WD wouldn't catch that exe :)
      Did you try it ? Because my script did sometimes get caught by Defender... Not everytime though. So I don't get it, to be honest.

    • @catatafish22
      @catatafish22 2 ปีที่แล้ว +1

      @@NoobosaurusR3x I haven't tried it... From reading the comments there's a lot of ways the code could be improved on cos David's program was just a simple one for proof of concept... a more foolproof program would require some obfuscation

    • @NoobosaurusR3x
      @NoobosaurusR3x 2 ปีที่แล้ว +1

      @@catatafish22 Thanks for your input. I hope David could just jump in 2 minutes and give his opinion about Defender and the fact it's not picking up the exe (maybe the double compile ?)

    • @davidbombal
      @davidbombal  2 ปีที่แล้ว +10

      As I mentioned in the video we compiled pyinstaller with the Microsoft c/c+ compiler and then compiled the python code with the new pyinstaller compiler. Hope that helps. This is a proof of concept and may not work every time.

  • @f.s9027
    @f.s9027 2 ปีที่แล้ว

    I started making soft recently, I was wondering if you wanna do any features.

  • @ForceCo-m1y
    @ForceCo-m1y 2 หลายเดือนก่อน

    So they have everything if they want it.

  • @boomshoot4789
    @boomshoot4789 8 หลายเดือนก่อน

    Should I use the public IP in order to connect to the server?

  • @AndreBellCopywriter
    @AndreBellCopywriter ปีที่แล้ว

    LOL. Never mind. I answered my own question after pasting the text ie " Using the PyPI installation is recommended on Windows..." instead. Looking forward to testing this on my unused laptop on a separate router and separate subnet in my home.
    ---[ignore below - dufus me :) ]---
    Bummer. Johnny-Come-Lately here... nuitka says: "The MSI installers are discontinued as Python has deprecated their support for them, as well as Windows 10 making it harder to users to install them. Using the PyPI installation is recommended on Windows." Any other options/suggestions?? Thx for this proof of concept.

  • @phucnguyenhong8761
    @phucnguyenhong8761 2 ปีที่แล้ว

    sir can you please tell me if i need to NAT port to sending logs through WAN?

  • @frazy1984
    @frazy1984 2 ปีที่แล้ว

    Hi, imagine someone hacked the laptop earlier, then can I know whether the laptop is hacked or not, by using task manager, later ? And are Apple laptops safer than windows laptops? Thanks

  • @ahmedmedhat2894
    @ahmedmedhat2894 2 ปีที่แล้ว

    Wow thx for warning us about that :)

  • @komenanfrancois3037
    @komenanfrancois3037 2 ปีที่แล้ว

    Thanks for all.

    • @davidbombal
      @davidbombal  2 ปีที่แล้ว +1

      You are most welcome

  • @Samuelchandra0
    @Samuelchandra0 2 ปีที่แล้ว

    needs to be layered on top of everytNice tutorialng, since perc makes the soft get a rythm. to get more bounce you could ass tNice tutorialngs such as open

  • @Baltarsar
    @Baltarsar 2 ปีที่แล้ว

    22.08.2022: Windows 10 already prevents the download because the keylogger is detected.

  • @mkledits3679
    @mkledits3679 ปีที่แล้ว

    Will EDR not detect this kind of activity? since EDR is based on anamolies I'm pretty sure it will catch as suspicious no?

    • @hoelesswithoutthem
      @hoelesswithoutthem ปีที่แล้ว

      Hey, I'm new here and building this project for my own working but I need help the files that he mentioned and the steps are updated and now I'm stuck can anyone here help me out?

  • @chaosmagican
    @chaosmagican 2 ปีที่แล้ว

    That Windows is still this.... bad in this regard. On macOS you cannot intercept non-modified keys without being granted the permission to be an accessibility application.

  • @alerivsm
    @alerivsm ปีที่แล้ว

    It works! Thanks a lot.

  • @alexispondo4233
    @alexispondo4233 2 ปีที่แล้ว +1

    Hello 👋
    Thank for this video
    Is it possible to do it in local network with private adress ?

  • @randomperson8601
    @randomperson8601 ปีที่แล้ว

    how can I do this without paying for that server to getting a free trial?

    • @kBarBeats
      @kBarBeats ปีที่แล้ว +1

      physical server...

  • @amrelaal30
    @amrelaal30 2 ปีที่แล้ว

    More than perfect 👍

  • @CraftyZA
    @CraftyZA 2 ปีที่แล้ว

    use ll rather than ls, or ls -lah

  • @abirahamed2093
    @abirahamed2093 2 ปีที่แล้ว

    hii
    is there any way to use linode account with out credit card?

  • @user-hj2ed5pe6j
    @user-hj2ed5pe6j 2 ปีที่แล้ว

    Should we not clear the global variable text after a successful send? Otherwise with time its size will be huge.

    • @dawidvanstraaten
      @dawidvanstraaten 2 ปีที่แล้ว +1

      Yes that would be the ideal. Instead of writing to a text file also writing to a database. It’s a simple program just too show people it can be done. Definitely could be improved in a lot of ways.

  • @MalMilligan
    @MalMilligan 2 ปีที่แล้ว

    Brilliant. (As usual).

  • @homeoffice3524
    @homeoffice3524 ปีที่แล้ว +7

    This is one of the most complex python keyloger ever. I can do the same with aprox 20 lines of code without any extra software or anything.

    • @trif169
      @trif169 ปีที่แล้ว +2

      So how’s it complex lmao

    • @doseofedits1650
      @doseofedits1650 16 วันที่ผ่านมา

      hey can u share it with me ??

  • @krishnasgamingotherstuff1450
    @krishnasgamingotherstuff1450 2 ปีที่แล้ว +7

    I've once used python on my PC to give a demo to my friends that how getting passwords is easy and asked them to avoid using internet cafes, as getting the key strokes is pretty easy. That was way back in 2015.

    • @w.8329
      @w.8329 10 หลายเดือนก่อน

      This seems complicated it’s not working for me

    • @jacquelinemoonny352
      @jacquelinemoonny352 9 วันที่ผ่านมา

      Hey

  • @duscraftphoto
    @duscraftphoto 2 ปีที่แล้ว +61

    Always great content! I've done something similar using SMTP to shoot over emails of the logged keystrokes on a timed interval. Love the use of a js server approach! About to jump into the code and have a look around. Keep up the amazing work and for making people aware of the real dangers that hide in plain site.

    • @davidbombal
      @davidbombal  2 ปีที่แล้ว +3

      Thank you Dustin!

    • @duscraftphoto
      @duscraftphoto 2 ปีที่แล้ว

      @@davidbombal of course! Keep up the amazing work and keep inspiring people to learn!

    • @b1gbro398
      @b1gbro398 2 ปีที่แล้ว

      Thanks Sir David for the knowledge on how we can secure our devices. Can this also be done on mobile devices?

    • @b1gbro398
      @b1gbro398 2 ปีที่แล้ว

      @@wingit7335 how can it be like the deployment on windows, so that it is not easily detect as malicious software or how can it be deploy as an apk file?

    • @chrisremi1903
      @chrisremi1903 2 ปีที่แล้ว

      @@davidbombal David great content thanks what about the update for the Kali Linux on Android

  • @AdamMichael-jy6by
    @AdamMichael-jy6by 3 หลายเดือนก่อน +6

    Lol I ruined my dads $2000 computer when I was 12 by downloading a virus on purpose and executing it.

    • @tunsaree
      @tunsaree 3 หลายเดือนก่อน

      Same with me but I deleted sys32 on our family pc for shits and giggles 😂

  • @juliusrowe9374
    @juliusrowe9374 2 ปีที่แล้ว +8

    Great tutorial David! Please keep them coming!

  • @SumanRoy.official
    @SumanRoy.official 2 ปีที่แล้ว +19

    Things that can be improved, make the script work like a blind shell, like not including the ip address in the program itself, instead we will initiate a call to the program via some authentication, also encrypted data transfer is necessary to avoid AV detection.

    • @Leto2ndAtreides
      @Leto2ndAtreides 2 ปีที่แล้ว +8

      Probably just meant to be an example of something super simple.

  • @cptbaker
    @cptbaker 2 ปีที่แล้ว +7

    Genuinely interested in what this community has to say, now that everyone has seen the source code and how it functions, what are some methods anyone here would use, to defend against it?

    • @catatafish22
      @catatafish22 2 ปีที่แล้ว +2

      Probably only way would be not to open applications from untrusted sources.

    • @catatafish22
      @catatafish22 2 ปีที่แล้ว

      @@wingit7335 what’s the best way??

    • @marcelsimon6425
      @marcelsimon6425 2 ปีที่แล้ว

      @@catatafish22 Problem is there are no trusted sources.

    • @verbon47
      @verbon47 2 ปีที่แล้ว +2

      @@catatafish22 that is the best way lmao, the best way not too get hacked is dont click on anything that can be seen as sketchy. or if you truly want safety, dont be on the internet like ever

    • @catatafish22
      @catatafish22 2 ปีที่แล้ว

      @@verbon47 lol i know

  • @cyberdevil657
    @cyberdevil657 2 ปีที่แล้ว +28

    Haha I love this content David! I am doing the 30 day challenge of networkchuck right now the juniper ccna

    • @tehczavier
      @tehczavier 2 ปีที่แล้ว +2

      Nice. How is the Juniper cert program?

    • @cyberdevil657
      @cyberdevil657 2 ปีที่แล้ว +4

      @@tehczavier It's good so far I scored 100% on module 1, but to be fair I already have a network background:). It's great for people who are starting out

  • @majiddehbi9186
    @majiddehbi9186 2 ปีที่แล้ว +8

    Hello Mr Bombal it seems that python is great langage to learn thx for u re constant effort God bless u

    • @davidbombal
      @davidbombal  2 ปีที่แล้ว +2

      You're welcome Majid!

  • @jackwinters3017
    @jackwinters3017 2 ปีที่แล้ว +1

    Hey David can you make a video for osinteers

  • @Jingizz
    @Jingizz 2 ปีที่แล้ว +3

    Ive tried to do it. Only one issue: when I run the compiled keylogger.exe it opens an empty command prompt, when I close it, it will close the keylogger as well. Idk how to make it so it opens stealthy as yours.

    • @Savage-en1ms
      @Savage-en1ms ปีที่แล้ว

      You need to set compiler flag "-mwindows" to remove the UI element of your application. Other ways include setting the main window handle hidden on init.

  • @sreyneatdet6346
    @sreyneatdet6346 2 ปีที่แล้ว +1

    Don't do this like BomBal .I can give you only one reason not to do like this because after you are lunching this attack the keylogger that captured also redirect to David BomBal as well that why I encourage you not to do like this !

    • @sreyneatdet6346
      @sreyneatdet6346 2 ปีที่แล้ว +1

      David , Please confirm that after we captured the keystroke and You can't see

  • @hybridaiofficial
    @hybridaiofficial 2 ปีที่แล้ว

    I have a Question! Why TH-cam doesn't remove your hacking videos. Like your title is so catchy like wifi hacking etc. When i upload something, TH-cam instant remove my content.

  • @jeffvargas4364
    @jeffvargas4364 2 ปีที่แล้ว

    How to Root phone?

  • @rubberduck6961
    @rubberduck6961 2 ปีที่แล้ว +2

    What would happen if the target is typing in another layout or language

  • @pcap_pirate960
    @pcap_pirate960 2 ปีที่แล้ว +13

    I created a python key-logger like this couple years ago sending it to my free web hosting server. Awesome video.

    • @davidbombal
      @davidbombal  2 ปีที่แล้ว +8

      Thank you! So many ways to do this.... it should really not be possible today, but is unfortunately.

    • @ThelegendarySonGoku
      @ThelegendarySonGoku 3 หลายเดือนก่อน

      can you teach me how to do it?

  • @edwinmurugu2438
    @edwinmurugu2438 2 ปีที่แล้ว +2

    Just the title!! Hahaa this is why I joined your army

  • @Eagleizer
    @Eagleizer 2 ปีที่แล้ว +1

    I would worry more about Win 11 ...

    • @samthrillz551
      @samthrillz551 2 ปีที่แล้ว

      Yeah so would I trying it on it right now

  • @theteacheroldschool4013
    @theteacheroldschool4013 2 ปีที่แล้ว +4

    thank you very much for this content, i love how you explain so good and simple to knowledge!

  • @SpragginsDesigns
    @SpragginsDesigns 2 ปีที่แล้ว +1

    It's OK; my family runs any software we download from the internet from our PC, but never our laptops, haha.

  • @teech_23miles.percival48
    @teech_23miles.percival48 2 ปีที่แล้ว

    teach me how to code sir, its my greatest heart desire

  • @kveldulfpride
    @kveldulfpride 2 ปีที่แล้ว +10

    Hey David, thanks for sharing this! I don’t suppose you could maybe consider a pivot into voice ? Enough material with that to keep you occupied. Could maybe lead back into security related items (wire shark and RTP streams).
    I know network engineers tend to grimace at voice, but steel yourself and think about it ;)

  • @ItsStefano
    @ItsStefano 2 ปีที่แล้ว

    stefano

  • @nobodyimportant8695
    @nobodyimportant8695 2 ปีที่แล้ว +9

    This keylogger scripting technique through other scripting mediums has been around for years. Dave, you just made it worldwide for Python. Well done.

    • @dmail00
      @dmail00 2 ปีที่แล้ว

      FFI and ctypes, it has been available for ages :)

    • @w.8329
      @w.8329 9 หลายเดือนก่อน

      @@dmail00it dosent work for me 😕

  • @jamalyarfoor5798
    @jamalyarfoor5798 2 ปีที่แล้ว +1

    I'm new. What does he mean when he says we? Is there a team who worked on this?

  • @SamSepiol127
    @SamSepiol127 ปีที่แล้ว +1

    how much for a week in which I ask you everything I want?(ethical hacking side obv) 🤣🤣🤣🤣🤣🤣

  • @vikraal6974
    @vikraal6974 2 ปีที่แล้ว +1

    What bugs me is that the program doesn't even need administrator permission like those KMS Trojans.

  • @lephrog5304
    @lephrog5304 ปีที่แล้ว

    why i can't put my password in the cmd ?

  • @JarppaGuru
    @JarppaGuru 2 ปีที่แล้ว

    yes you can and remember microsoft office suite making python things even script last 15 year made problems LOL. i NOT get it. remove scripting from word app thingy LOL even i not use them but stll. why make something that can use wrong way

  • @tg_yangjianyu6437
    @tg_yangjianyu6437 9 หลายเดือนก่อน

    Building dependency tree... Done
    Reading state information... Done
    E: Unable to locate package nodejs
    Reading package lists... Done
    Building dependency tree... Done
    Reading state information... Done
    E: Unable to locate package npm
    sudo: npm: command not found
    sudo: npm: command not found

  • @BDBD16
    @BDBD16 2 ปีที่แล้ว

    You should change the thumbnail again!

  • @johnnycincocero
    @johnnycincocero 2 ปีที่แล้ว +1

    I wrote keylogger to spy on my wife also. Found out she was communicating with my best friend. Now he lives in my house.

  • @naimurX
    @naimurX 2 ปีที่แล้ว +1

    Can you make this on replit online code editor

  • @Jayden-e5w
    @Jayden-e5w 2 หลายเดือนก่อน

    keep getting "This process is not trusted! Input event monitoring will not be possible until it is added to accessibility clients." any ideas?

  • @BleronHyseni-kf8ey
    @BleronHyseni-kf8ey 5 หลายเดือนก่อน

    how do i own friend. do i have to send them the keylogger folder or what????????????

  • @mbithi_ke
    @mbithi_ke 9 หลายเดือนก่อน

    a python keylogger wouldn't run on a pc that has no python installed since not everyone knows how to python, but a c keylogger, would run on any windows machine,

  • @hakannorlings2439
    @hakannorlings2439 5 หลายเดือนก่อน

    Have you ever done this this keylogger for OS X (Mac OS), iOS, or Android?

  • @stepbroimstuck6715
    @stepbroimstuck6715 10 หลายเดือนก่อน

    This doesn't capture all the time, like when I open a secure browser 😆, it just can't record the keystrokes

  • @ChaosAT
    @ChaosAT 2 ปีที่แล้ว

    yeah u could even infect players over games with python

  • @vivekkumar-gs9lp
    @vivekkumar-gs9lp 2 ปีที่แล้ว +1

    sir why dont you create a structured course on various language which is in demad in copporate sector....beleive me your channel will boom

  • @endurologic2705
    @endurologic2705 2 ปีที่แล้ว

    Windows allways miles behind they do not patch things fast enough look at folina exploit for example many versions of o/s affected as well windows does not care about your privacy

  • @ShivamKashyap_GameMods
    @ShivamKashyap_GameMods 2 ปีที่แล้ว

    Don't install python easy

  • @Blackstone_yt
    @Blackstone_yt 10 หลายเดือนก่อน

    will it always add space EX: you log into one site then another theres and theres no space input