Warning! Python Remote Keylogger (this is really too easy!)

  Рет қаралды 363,722

David Bombal

David Bombal

Күн бұрын

Пікірлер: 422
@davidbombal
@davidbombal 2 жыл бұрын
Create your own virtual machine on Linode with a 60-day $100 credit: davidbombal.wiki/linode If that link doesn't work for you, try this link: www.linode.com/lp/youtube-viewers/?ifso=davidbombal Please note: Credits expire in 60 days. Big thanks to Linode for sponsoring this video! I wrote a Python program that saves keystrokes to a cloud server. I compiled the script to run on a Windows 11 computer with anti-virus enabled. May this be a warning to both you and your family. Don't download software that you don't trust. Only download software from reputable software developers and those you trust. Disclaimer: This video is for educational purposes only. I own all equipment used for this demonstration. No actual attack took place. // MENU // 00:00 - Be careful what you download 00:07 - Intro 00:16 - How to capture keystrokes with Python 00:41 - Keylogger demo 03:30 - How to setup the keylogger 10:34 - Conclusion // Code // Keylogger: github.com/davidbombal/python-keylogger Server: github.com/davidbombal/express-server-basic // Video mentioned // Python keylogger bypasses Windows 11 Defender: kzbin.info/www/bejne/p5K9XnyYqNiDeqs // SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal KZbin: kzbin.info // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
@-nary-zy5jt
@-nary-zy5jt 2 жыл бұрын
Dear David, I'm telling your her 🖐🏻😡.
@duckyblenderold
@duckyblenderold 2 жыл бұрын
i think you forgot to pin this
@gtxgamer5025
@gtxgamer5025 Жыл бұрын
But what if I don't have a python download??
@nobodyimportant8695
@nobodyimportant8695 2 жыл бұрын
This keylogger scripting technique through other scripting mediums has been around for years. Dave, you just made it worldwide for Python. Well done.
@dmail00
@dmail00 2 жыл бұрын
FFI and ctypes, it has been available for ages :)
@w.8329
@w.8329 Жыл бұрын
@@dmail00it dosent work for me 😕
@duscraftphoto
@duscraftphoto 2 жыл бұрын
Always great content! I've done something similar using SMTP to shoot over emails of the logged keystrokes on a timed interval. Love the use of a js server approach! About to jump into the code and have a look around. Keep up the amazing work and for making people aware of the real dangers that hide in plain site.
@davidbombal
@davidbombal 2 жыл бұрын
Thank you Dustin!
@duscraftphoto
@duscraftphoto 2 жыл бұрын
@@davidbombal of course! Keep up the amazing work and keep inspiring people to learn!
@b1gbro398
@b1gbro398 2 жыл бұрын
Thanks Sir David for the knowledge on how we can secure our devices. Can this also be done on mobile devices?
@b1gbro398
@b1gbro398 2 жыл бұрын
@@wingit7335 how can it be like the deployment on windows, so that it is not easily detect as malicious software or how can it be deploy as an apk file?
@chrisremi1903
@chrisremi1903 2 жыл бұрын
@@davidbombal David great content thanks what about the update for the Kali Linux on Android
@juliusrowe9374
@juliusrowe9374 2 жыл бұрын
Great tutorial David! Please keep them coming!
@Mr.Noob_T.I
@Mr.Noob_T.I Жыл бұрын
one of the few channels that show content of relevance!!!!!! I wish you were my mentor... I managed to reproduce another keylogger on the desktop! it also prints every click along with a notepad with text captures and creates folders separated by date!!! finally I managed to reproduce your code and forward the log file to a server... thank you very much for sharing your knowledge!!!!!! I am a Programming and Information Security enthusiast🇧🇷
@pcap_pirate960
@pcap_pirate960 2 жыл бұрын
I created a python key-logger like this couple years ago sending it to my free web hosting server. Awesome video.
@davidbombal
@davidbombal 2 жыл бұрын
Thank you! So many ways to do this.... it should really not be possible today, but is unfortunately.
@ThelegendarySonGoku
@ThelegendarySonGoku 6 ай бұрын
can you teach me how to do it?
@Spitfire_Cowboy
@Spitfire_Cowboy 2 жыл бұрын
Rather than outputting to a text file, you could use a nosql db and output the processes running at the time of the key logging to have a better picture of what the target is using at the time they are typing.
@davidbombal
@davidbombal 2 жыл бұрын
We decided against doing that here to keep things simple. This is a proof of concept and can be improved in many ways. We can code in many other options, but this is for educational purposes only and not to build malware.
@Spitfire_Cowboy
@Spitfire_Cowboy 2 жыл бұрын
@@davidbombal agreed. I actually like the simple poc. It leaves alot of potential open that could be touched on or brainstormed or discussed in general. Especially if talking about major nation state adversaries and their toolsets to gain access to sensitive western critical infrastructure systems. Or general minor ransomware criminal groups with their initial access brokers.
@codewithgabriel4626
@codewithgabriel4626 2 жыл бұрын
This is awesome, it's more effective If the keylogger run as a daemon in the background and it is start running on system boot up
@davidbombal
@davidbombal 2 жыл бұрын
This is only a proof of concept and can improved in many ways. We didn't show everything here because of KZbin rule.
@JB-fh1bb
@JB-fh1bb 2 жыл бұрын
@@davidbombal Now I’m curious: what didn’t you show (besides compile steps)?
@rabblegaming4815
@rabblegaming4815 11 ай бұрын
​@@davidbombalWhere can I learn and see everything, I am into python development. How do people like you learn? Everything nowadays is hidden either for going into courses and spending money or just people not to see and analise.
@SumanRoy.official
@SumanRoy.official 2 жыл бұрын
Things that can be improved, make the script work like a blind shell, like not including the ip address in the program itself, instead we will initiate a call to the program via some authentication, also encrypted data transfer is necessary to avoid AV detection.
@Leto2ndAtreides
@Leto2ndAtreides 2 жыл бұрын
Probably just meant to be an example of something super simple.
@djamarildo2010
@djamarildo2010 2 жыл бұрын
Amazing content David I like that you bring us the best reputable personalities in their speciality field so we can learn from the best no need for fancy botcamps😄 ✅🖥️🙏
@l3chevalier
@l3chevalier Жыл бұрын
Awesome video, thank you David 😊! Those PoCs are really good for us to build countermeasures to that kind of stuff. I got curious about python compilation actually, I've did some Python install before but never compiled it as a binary, will give it a try later.
@krishnasgamingotherstuff1450
@krishnasgamingotherstuff1450 2 жыл бұрын
I've once used python on my PC to give a demo to my friends that how getting passwords is easy and asked them to avoid using internet cafes, as getting the key strokes is pretty easy. That was way back in 2015.
@w.8329
@w.8329 Жыл бұрын
This seems complicated it’s not working for me
@jacquelinemoonny352
@jacquelinemoonny352 3 ай бұрын
Hey
@aleksalukic1904
@aleksalukic1904 2 жыл бұрын
I started to smile after I saw the first thumbnail of this video. It was like Saurons Eye from the Lord of the Rings is watching you. And now it's like a Ringwraith.
@mr.smithsmith71
@mr.smithsmith71 2 жыл бұрын
what about how to stop remote keyloggers? what antivirus or app can detect them?
@theteacheroldschool4013
@theteacheroldschool4013 2 жыл бұрын
thank you very much for this content, i love how you explain so good and simple to knowledge!
@TheDirge69
@TheDirge69 2 жыл бұрын
Great content again. Reading the comments and your responses is very helpful in educating us, thanks!
@davidbombal
@davidbombal 2 жыл бұрын
You're welcome!
@homeoffice3524
@homeoffice3524 2 жыл бұрын
This is one of the most complex python keyloger ever. I can do the same with aprox 20 lines of code without any extra software or anything.
@trif169
@trif169 2 жыл бұрын
So how’s it complex lmao
@doseofedits1650
@doseofedits1650 3 ай бұрын
hey can u share it with me ??
@adrianescobar5818
@adrianescobar5818 13 күн бұрын
post it?
@CyberDevilSec
@CyberDevilSec 2 жыл бұрын
Haha I love this content David! I am doing the 30 day challenge of networkchuck right now the juniper ccna
@tehczavier
@tehczavier 2 жыл бұрын
Nice. How is the Juniper cert program?
@CyberDevilSec
@CyberDevilSec 2 жыл бұрын
@@tehczavier It's good so far I scored 100% on module 1, but to be fair I already have a network background:). It's great for people who are starting out
@kveldulfpride
@kveldulfpride 2 жыл бұрын
Hey David, thanks for sharing this! I don’t suppose you could maybe consider a pivot into voice ? Enough material with that to keep you occupied. Could maybe lead back into security related items (wire shark and RTP streams). I know network engineers tend to grimace at voice, but steel yourself and think about it ;)
@majiddehbi9186
@majiddehbi9186 2 жыл бұрын
Hello Mr Bombal it seems that python is great langage to learn thx for u re constant effort God bless u
@davidbombal
@davidbombal 2 жыл бұрын
You're welcome Majid!
@rubberduck6961
@rubberduck6961 2 жыл бұрын
What would happen if the target is typing in another layout or language
@markc6714
@markc6714 2 жыл бұрын
The problem with spying on your partner is sometimes you find out something you wish you didn't
@0xMalWorld
@0xMalWorld 2 жыл бұрын
yeah, that's a risk... But imao it worth it
@johnnycincocero
@johnnycincocero 2 жыл бұрын
I wrote keylogger to spy on my wife also. Found out she was communicating with my best friend. Now he lives in my house.
@stunduptosee1073
@stunduptosee1073 2 жыл бұрын
Thank you for this informative and educational video!
@moshicloud
@moshicloud 2 жыл бұрын
Ive tried to do it. Only one issue: when I run the compiled keylogger.exe it opens an empty command prompt, when I close it, it will close the keylogger as well. Idk how to make it so it opens stealthy as yours.
@Savage-en1ms
@Savage-en1ms 2 жыл бұрын
You need to set compiler flag "-mwindows" to remove the UI element of your application. Other ways include setting the main window handle hidden on init.
@davidmckee533
@davidmckee533 2 жыл бұрын
Bad Mr Bombal Bad, keep the videos coming thank you learned alot!!
@davidbombal
@davidbombal 2 жыл бұрын
Glad you learned something David
@millymichael4701
@millymichael4701 2 жыл бұрын
David, you said you were going to show us how to capture a handshake with Kali Linux installed on our android phones.
@jesseclutterbuck6617
@jesseclutterbuck6617 2 жыл бұрын
you cant. android dosnt surport monator mode also you need to send a deauth packet to the target to catch the handshake. and the handshake uses encryption. use a laptop and a 64bit version of kali
@DNOD1983
@DNOD1983 2 жыл бұрын
Thank you for your continued commitment to education.
@davidbombal
@davidbombal 2 жыл бұрын
Thank you Desmond. You're welcome!
@vikraal6974
@vikraal6974 2 жыл бұрын
What bugs me is that the program doesn't even need administrator permission like those KMS Trojans.
@Nanoui94
@Nanoui94 2 жыл бұрын
Make a video to show us how to create own server to save the data without Linode, please?? Thank you David for the fantastic videos!!
@lewisheath364
@lewisheath364 2 жыл бұрын
just run the javascript code on your machine and forward the ports from your router
@Foiliagegaming
@Foiliagegaming 2 жыл бұрын
set up a raspberry pi running ubuntu or whatever locally.
@Nanoui94
@Nanoui94 2 жыл бұрын
@@lewisheath364 okay, thanks
@Nanoui94
@Nanoui94 2 жыл бұрын
@@Foiliagegaming okay, thanks
@alezad57121
@alezad57121 2 жыл бұрын
Thank you for demonstrating this.
@vivekkumar-gs9lp
@vivekkumar-gs9lp 2 жыл бұрын
sir why dont you create a structured course on various language which is in demad in copporate sector....beleive me your channel will boom
@markobojovic9799
@markobojovic9799 2 жыл бұрын
Yeah, sure, you can do that, Windows doesn't block it but what it does block is my compiled production-ready program without any single malware in it for absolutely no reason...
@jamalyarfoor5798
@jamalyarfoor5798 2 жыл бұрын
I'm new. What does he mean when he says we? Is there a team who worked on this?
@realJaycelee
@realJaycelee 2 жыл бұрын
Do you have any recommendations on books in Computer Science? I want to learn Computer Science before JavaScript and Python.
@hartatociptajaya
@hartatociptajaya 2 жыл бұрын
it is not books but you can easily find resources on harvard CS50 and Freedcodecamp channel.
@realJaycelee
@realJaycelee 2 жыл бұрын
@@hartatociptajaya Thank you, I know some of the Free courses require a text book. Have to look into this one, because a couple people recommend this course.
@catatafish22
@catatafish22 2 жыл бұрын
You’re probably putting the horse before the cart if you do that… if you want a bit of an overview on some computer science, there’s a vid called ‘the art of code’ on KZbin. Learning a simple language like python is much easier than learning computer science. Walk before you run!
@realJaycelee
@realJaycelee 2 жыл бұрын
@@catatafish22 Wouldn't it be the other way around? I want to learn the basics of computer science in order to have the fundamentals and when I go to learn a language I'll know how the computer functions, instead of just following examples that I have no idea why I'm doing what I'm doing.
@cptbaker
@cptbaker 2 жыл бұрын
Genuinely interested in what this community has to say, now that everyone has seen the source code and how it functions, what are some methods anyone here would use, to defend against it?
@catatafish22
@catatafish22 2 жыл бұрын
Probably only way would be not to open applications from untrusted sources.
@catatafish22
@catatafish22 2 жыл бұрын
@@wingit7335 what’s the best way??
@marcelsimon6425
@marcelsimon6425 2 жыл бұрын
@@catatafish22 Problem is there are no trusted sources.
@verbon47
@verbon47 2 жыл бұрын
@@catatafish22 that is the best way lmao, the best way not too get hacked is dont click on anything that can be seen as sketchy. or if you truly want safety, dont be on the internet like ever
@catatafish22
@catatafish22 2 жыл бұрын
@@verbon47 lol i know
@MrBitviper
@MrBitviper 2 жыл бұрын
thanks for the awesome content David
@nachosncheez2492
@nachosncheez2492 2 жыл бұрын
Nice video, if i was do it this i would use sockets for real time communication and a common port such as 443 + inject a binary blob into memory for a listener to setup a shell, that the program can load using a pointer. easy web c&c.
@sreyneatdet6346
@sreyneatdet6346 2 жыл бұрын
Someone said this virus is undetectable ! So funny maybe they are recently using windows 7 !
@fyzzlefry
@fyzzlefry 2 жыл бұрын
Thanks for this. Ill fire up a demo for our monthly meeting.
@davidbombal
@davidbombal 2 жыл бұрын
Hopefully they learn from this video 😀
@richieheins6825
@richieheins6825 2 жыл бұрын
We dont deserve you David. Thank you so much!
@davidbombal
@davidbombal 2 жыл бұрын
Thank you Richie!
@portman8909
@portman8909 10 ай бұрын
With a security key for sign in the keylogger won't be able to fetch anything. The threat would be a cookie session stealer malware, but that would have to bypass the virus detection which is not likely.
@loficafechill
@loficafechill 2 жыл бұрын
in other words this can also bypass a separate firewall? wow this is crazy stuff.
@TioGu76
@TioGu76 2 жыл бұрын
Awesome video David, but, how can we prevent our machines from these tools?
@errollgnargnar
@errollgnargnar 2 жыл бұрын
Great video man. Love the server
@AdamMichael-jy6by
@AdamMichael-jy6by 6 ай бұрын
Lol I ruined my dads $2000 computer when I was 12 by downloading a virus on purpose and executing it.
@tunsaree
@tunsaree 6 ай бұрын
Same with me but I deleted sys32 on our family pc for shits and giggles 😂
@aggelosgedeon1405
@aggelosgedeon1405 2 жыл бұрын
0:00 so running it on my desktop would be fine?
@h.fontanez5453
@h.fontanez5453 2 жыл бұрын
The question is: how is this prevented? I like to see the responses for both; Enterprise level and single host.
@EraYaN
@EraYaN 2 жыл бұрын
With custom (targeted) stuff like this, honestly you don’t. Only chance is before it’s executed.
@catatafish22
@catatafish22 2 жыл бұрын
Don’t open applications from untrusted sources
@h.fontanez5453
@h.fontanez5453 2 жыл бұрын
HIPS , Allow list with hashes comes to mind. Would these be good options?
@PySnek
@PySnek 2 жыл бұрын
Windows would block the execution and you'd have to allow it first. It's not that easy anymore since Win10.
@schwingedeshaehers
@schwingedeshaehers 2 жыл бұрын
may add -y to the install script in the install lines (and merge the lines)
@Mr.WhiteBeard
@Mr.WhiteBeard 2 жыл бұрын
Can we mirroring site using cors method with python? In php we can use php get_content. How about python ?
@TheMordano
@TheMordano 2 жыл бұрын
CORS is Cross-Origin Resource Sharing. It is meant to restrict/control the access of resources. It is not to load/copy any data/content. CORS is not Python specific.
@mohamednarhmouche364
@mohamednarhmouche364 2 жыл бұрын
if you want you can also create a python scripting course on youtube
@Electro-tw9um
@Electro-tw9um 11 ай бұрын
So recompiling PyInstaller bypasses Defender, but wouldn't SmartScreen block the EXE as it is unknown (if it was real malware and actually was downloaded from the Internet by "your victim")?
@ALessOffensiveName
@ALessOffensiveName 11 ай бұрын
I am ok with python code but I have no idea about C code. When you say you used a C compiler to compile it does that mean you can compile python code in C compilers or did you have to use C code to make it work? Thanks for the video.
@wiktormigaszewski8684
@wiktormigaszewski8684 7 ай бұрын
I need an example file of someone who wrote a longer text (a story or a masters thesis) - is there any such public repository?
@Jayden-e5w
@Jayden-e5w 5 ай бұрын
keep getting "This process is not trusted! Input event monitoring will not be possible until it is added to accessibility clients." any ideas?
@kianrees8142
@kianrees8142 Жыл бұрын
How can i send the keylogging data to my own server. Do i just open a port on my server like 8080 shown in the scipt and add my server ip in the scipt too?
@weedogo5559
@weedogo5559 2 жыл бұрын
Spyware are shown in procexplorer? like sketchy process running. Or they are just not visible?
@kekeke7815
@kekeke7815 2 жыл бұрын
Are the sample softs there when you open the software or do you have to download them from sowhere
@dreamscapeshomesolutions7888
@dreamscapeshomesolutions7888 2 жыл бұрын
Hi, David. What would you recommend for scanning pdf's and images for rats and loggers? These day's many of us download quite a number of pdf's for education and images for our own curating.
@dreamscapeshomesolutions7888
@dreamscapeshomesolutions7888 2 жыл бұрын
Comments like this from , text me "@ the official blah blah blah" seem like a game best played later. ; - )
@220VolT
@220VolT 2 жыл бұрын
UAC doesn't popup at all when you execute?
@SpragginsDesigns
@SpragginsDesigns 2 жыл бұрын
It's OK; my family runs any software we download from the internet from our PC, but never our laptops, haha.
@Foiliagegaming
@Foiliagegaming 2 жыл бұрын
set up a small local server that is running on cellular network and have it set up on the local network then forward the traffic from there.
@lancemarchetti8673
@lancemarchetti8673 2 жыл бұрын
Great video...thanks David.
@davidbombal
@davidbombal 2 жыл бұрын
Thank you Lance!
@Marie-j8k
@Marie-j8k 4 ай бұрын
What do you recommend for someone who has remote keylogger (victim) on their computer and wants to remove it? Many thanks
@edwinmurugu2438
@edwinmurugu2438 2 жыл бұрын
Just the title!! Hahaa this is why I joined your army
@razashah2611
@razashah2611 2 жыл бұрын
More videos like this but easy one's please for beginners.
@JonnyClark
@JonnyClark 2 жыл бұрын
Awesome video David !
@davidbombal
@davidbombal 2 жыл бұрын
Thank you Jonny!
@maximedemontbron5179
@maximedemontbron5179 8 ай бұрын
Hi David, just wondering if there's a way to encrypt the keylogged traffic / passwords as I'm sending them to my linode. Maybe I want to test this with my own passwords but I don't want the connection to be readable by eavesdroppers.
@cirklare
@cirklare 2 жыл бұрын
I did the same thing and uploaded it to my github page It send keystrokes to my email using SMTP library
@davidbombal
@davidbombal 2 жыл бұрын
Very cool
@ForwardEngineering
@ForwardEngineering 2 жыл бұрын
Can this be done within windows and to keylog another windows machine? I don't really want to spin up a entire Linux vm just for logging.
@mkledits3679
@mkledits3679 Жыл бұрын
Will EDR not detect this kind of activity? since EDR is based on anamolies I'm pretty sure it will catch as suspicious no?
@hoelesswithoutthem
@hoelesswithoutthem Жыл бұрын
Hey, I'm new here and building this project for my own working but I need help the files that he mentioned and the steps are updated and now I'm stuck can anyone here help me out?
@phucnguyenhong8761
@phucnguyenhong8761 2 жыл бұрын
sir can you please tell me if i need to NAT port to sending logs through WAN?
@morleytechtv7749
@morleytechtv7749 2 жыл бұрын
Windows Defender can detect it now,
@Bonny2035
@Bonny2035 Ай бұрын
You can still bypass the waf of your PC. Try other things, change ports, make some changes to the script, it will work.
@yasashikunizam1311
@yasashikunizam1311 2 жыл бұрын
what if we run this file as a script on the AD .... and it will automatically run right? fun but scarry ...
@dayshag5257
@dayshag5257 2 жыл бұрын
what if i just want the capture file on my my on PC?
@naimurX
@naimurX 2 жыл бұрын
Can you make this on replit online code editor
@alexispondo4233
@alexispondo4233 2 жыл бұрын
Hello 👋 Thank for this video Is it possible to do it in local network with private adress ?
@fyzzlefry
@fyzzlefry 2 жыл бұрын
As long as its routable
@alexispondo4233
@alexispondo4233 2 жыл бұрын
Ok thank
@charlesyaw6514
@charlesyaw6514 2 жыл бұрын
Dave could you create a GNS3 topology for key logging?
@accountoneripley7631
@accountoneripley7631 Жыл бұрын
Hello, what program do you use to record the windows desktop?
@k98killer
@k98killer 2 жыл бұрын
Reminds me of some of my earliest experiments in writing my own penetration tools. The logger I wrote worked poorly and only locally on my own computer. Hilariously bad but still somewhat functional. The more fun experiments were controlling pointers remotely. Good times.
@tijad1
@tijad1 2 жыл бұрын
How can i reach you ?
@scp049leplaguedocter3
@scp049leplaguedocter3 Жыл бұрын
@@tijad1 hands
@MoazRamadan-l8t
@MoazRamadan-l8t 3 ай бұрын
Amazing as always ❤
@XtecherPY
@XtecherPY 2 жыл бұрын
Hackers: Alright copy that run that and the keylogger is complete! Me: So do you have a github repository or something?
@jackwinters3017
@jackwinters3017 2 жыл бұрын
Hey David can you make a video for osinteers
@alidanish6263
@alidanish6263 2 жыл бұрын
Great Content! I am a big fan. I did all of this and windows defender did not detected it but when i sent it to my friend to check it out by uploading it to google drive. When he downloaded it windows defender picked it up. Is there something i can do to avoid this?
@youdummy5928
@youdummy5928 2 жыл бұрын
this script is getting detected in my computer(windows 11) and automatically being deleted in vs code after saving showing the warning that this file contains virus
@user-hj2ed5pe6j
@user-hj2ed5pe6j 2 жыл бұрын
Should we not clear the global variable text after a successful send? Otherwise with time its size will be huge.
@dawidvanstraaten
@dawidvanstraaten 2 жыл бұрын
Yes that would be the ideal. Instead of writing to a text file also writing to a database. It’s a simple program just too show people it can be done. Definitely could be improved in a lot of ways.
@MrSandshadow
@MrSandshadow 2 жыл бұрын
8:45 that makes no sense, unless msft compiler adds something to the code... but i highly doubt that. I see no reason why you would have to re-compile py-installer....
@cezartorescu
@cezartorescu 2 жыл бұрын
It is useless but it seems it helps tricking windows crappy defender :))
@MrSandshadow
@MrSandshadow 2 жыл бұрын
@@cezartorescu But does it mean msft signs somehow binaries with their compiler? --- edit well it might also use different sys calls in the generated bin thus it's doing 'unexpected' by defender stuf and does not match any patters?
@cezartorescu
@cezartorescu 2 жыл бұрын
@@MrSandshadow has to be something like that. People should never rely on ms Defender which is an absolute nuissance :))
@davidbombal
@davidbombal 2 жыл бұрын
Try it without doing this. And try it when doing this and see the difference. We would not have done the extra step unless it was necessary.
@New-qg3zj
@New-qg3zj 2 жыл бұрын
How to prevent Android mobile getting attacked by spy ware. How to know if the mobile is comprised by spyware
@NoobosaurusR3x
@NoobosaurusR3x 2 жыл бұрын
Heya David. Nice video, as usual :) I have a small question though. Why is windows Defender not picking up the exe file ? It usually picks up python scripts quite easily and the library you did use, is using winapi and that is not even trying to evade detection. Could you explain, please ? :)
@catatafish22
@catatafish22 2 жыл бұрын
He couldn’t explain the specifics due to legal reasons (cos then he’d literally be telling us how to install malicious scripts on someone’s computer in a yt vid)… but from what I gathered, he was able to bypass windows defender because the program was made using a C+ compiler. C+ is native to windows, so windows defender does not recognise it as being malicious… a python installer is embedded in the program, along with a keylogger written in python. A sneaky and very simple way of beating the firewall. You’ll be able to see how it’s done if you look at the code in the program he built.
@NoobosaurusR3x
@NoobosaurusR3x 2 жыл бұрын
@@catatafish22 I did look at the code :) That's why I came to ask the question here. I was wondering if it was the kinda double compiling he was talking about but, really, I don't get why WD wouldn't catch that exe :) Did you try it ? Because my script did sometimes get caught by Defender... Not everytime though. So I don't get it, to be honest.
@catatafish22
@catatafish22 2 жыл бұрын
@@NoobosaurusR3x I haven't tried it... From reading the comments there's a lot of ways the code could be improved on cos David's program was just a simple one for proof of concept... a more foolproof program would require some obfuscation
@NoobosaurusR3x
@NoobosaurusR3x 2 жыл бұрын
@@catatafish22 Thanks for your input. I hope David could just jump in 2 minutes and give his opinion about Defender and the fact it's not picking up the exe (maybe the double compile ?)
@davidbombal
@davidbombal 2 жыл бұрын
As I mentioned in the video we compiled pyinstaller with the Microsoft c/c+ compiler and then compiled the python code with the new pyinstaller compiler. Hope that helps. This is a proof of concept and may not work every time.
@f.s9027
@f.s9027 2 жыл бұрын
I started making soft recently, I was wondering if you wanna do any features.
@chaosmagican
@chaosmagican 2 жыл бұрын
That Windows is still this.... bad in this regard. On macOS you cannot intercept non-modified keys without being granted the permission to be an accessibility application.
@jackson32
@jackson32 2 жыл бұрын
Can this keylogger program be put in non executable files like PDF files, pictures, videos etc?
@komenanfrancois3037
@komenanfrancois3037 2 жыл бұрын
Thanks for all.
@davidbombal
@davidbombal 2 жыл бұрын
You are most welcome
@bubz1kbytez
@bubz1kbytez 2 жыл бұрын
how can I test this out with a VM in kali VirtualBox?
@CarKeyGuyNL
@CarKeyGuyNL 2 жыл бұрын
Thanks for the nice scripting.. but i am curious.. Did you find some concerned keystrokes on you'r wife's computer???
@rinormehmeti1502
@rinormehmeti1502 2 жыл бұрын
is it possible to modify the code that the data can be saved in a local database
@MamaMia84oo7
@MamaMia84oo7 Жыл бұрын
Yes of course. Even easier. That’s good if you want to keep track of your kids PC or maybe wife lol. When I played around with these keyloggers , I used to email the logs to myself.
@psycedelic
@psycedelic 2 жыл бұрын
good stationary computer safe as you only said laptop!
@charon3444
@charon3444 2 жыл бұрын
5:28 seeing a white stripe in the german flag makes me feel more uncomfortable than i would have imagined... wierd darkmode coincidences^^
@davidbombal
@davidbombal 2 жыл бұрын
Dark Mode does some strange things sometimes 😂
@mahendrasharma4041
@mahendrasharma4041 2 жыл бұрын
i m from india ....your content is great ...... really
@cruzalex9662
@cruzalex9662 Жыл бұрын
Please how did you get it to run in the background
Have you been hacked? Hacker explains how to find out!
52:19
David Bombal
Рет қаралды 168 М.
Access Location, Camera  & Mic of any Device 🌎🎤📍📷
15:48
zSecurity
Рет қаралды 2,7 МЛН
黑天使只对C罗有感觉#short #angel #clown
00:39
Super Beauty team
Рет қаралды 36 МЛН
Beat Ronaldo, Win $1,000,000
22:45
MrBeast
Рет қаралды 158 МЛН
My scorpion was taken away from me 😢
00:55
TyphoonFast 5
Рет қаралды 2,7 МЛН
3 HACKING gadgets you have to TRY!!
19:34
NetworkChuck
Рет қаралды 1,7 МЛН
How To Code A Keylogger In Python | Programming Tutorial For Beginners
10:12
3 Levels of WiFi Hacking
22:12
NetworkChuck
Рет қаралды 2,4 МЛН
Metasploit
34:20
David Bombal
Рет қаралды 408 М.
What are you going to do in 2023? Tops 5 skills to get!
18:56
David Bombal
Рет қаралды 2,4 МЛН
Can Malware escape Virtual Machines?
9:25
Eric Parker
Рет қаралды 151 М.
Hackers Are Waiting For You to Open This Image
15:18
zSecurity
Рет қаралды 245 М.
How Hackers Write Malware & Evade Antivirus (Nim)
24:04
John Hammond
Рет қаралды 416 М.
(✋❌)kageihina VS siajiwoo VS meosimmyyt VS oxzung#tiktok #shorts
0:12
ЛАЙФХАК НА КУХНЕ ! 🧐🤦🏻‍♂️ #shorts #лайфхак
0:15
Крус Костилио
Рет қаралды 109 М.
🪄Вечная спичка #diy #выживание #поход
1:00
Короче, ВИ
Рет қаралды 2,8 МЛН
#trending #foryou #challenge #fyp #viral #short #tiktok #vs
0:15
Misiсatсh
Рет қаралды 2,4 МЛН
Fake iPhone 14 Pro Max за 10.000 РУБ.
16:00
Wylsacom
Рет қаралды 1 МЛН
The Million view clip on China's Tiktok P2428 #shorts #gochannel
0:15
Go Channel TV
Рет қаралды 29 МЛН