Udemy – Ethical Hacking: Design an Info Stealer using Python 3 2024-5
Udemy – Ethical Hacking: Design an Info Stealer using Python 3 2024-5 Downloadly IRSpace

The course Ethical Hacking: Design an Info Stealer using Python 3 has just been published in 2024. In this course, you will learn how to design and build a fully functional “information thief” that you can use for training purposes on your own computer, or on remote computers at your workplace, or even for clients for whom Red exercises Team you do can also be used. After we finish building this tool together, it will have three capabilities:
- Keylogging: All keys pressed are written to internal storage, a UNC path, or a network share.
- Taking a picture of the page (Screenshots): Taking a picture of the page is done at specific time intervals that you set in the code. These photos are stored on internal storage, a UNC path, or a network share.
- Extracting from the clipboard (Clipboard): This function works the same as taking a screenshot, with the difference that at certain time intervals, the information in the clipboard is copied and stored in a file on the internal memory, UNC path or a network share. is saved.
In this course all the code will be explained, so there is nothing to worry about for beginners, however, more experienced programmers may learn new things, and besides, the final product will be really great. I’ll also teach you how to convert your Python code into a single executable file to include the Python code and all its dependencies. Then, when it’s time to run Python on the target computer, there’s no need to have Python on that system anymore, and our code will still run. Finally, I’ll show you some Windows commands that are typically enabled or available in corporate or government networks that use Microsoft Active Directory (AD). If you are part of the same domain and have the proper credentials, you may be able to use these commands to execute your Python code remotely on the target computer.
What you will learn in the Ethical Hacking: Design an Info Stealer using Python 3 course
- Programming with Python and how to build a hacker that you can use for cyber security clearance tests or for educational purposes
- Write code for a keylogger, including code that takes screenshots and code that copies anything saved to the clipboard
- Remote code execution on a target computer that you access via winrs, psexec, or wmic
- Run the code on your local computer
- Run code on target computers that do not have Python installed
Who is this course suitable for?
This course is suitable for anyone interested in building their own ethical hacking tools using the Python 3 programming language. This is a great course to start with because it’s not overly complicated, but very practical.
Details of the Ethical Hacking course: Design an Info Stealer using Python 3
- Publisher: Udemy
- Instructor: Bill Reed
- Training level: beginner to advanced
- Training duration: 1 hour and 48 minutes
- Number of courses: 12
Course headings
Ethical Hacking course prerequisites: Design an Info Stealer using Python 3
- No programming experience necessary. I will walk you through every line of code and explain it all.
Course images
Sample video of the course
Installation guide
After Extract, view with your favorite Player.
English subtitle
Quality: 720p
download link
File(s) password: www.downloadly.ir
Size
849 MB