Learn how to convert your Python code to run as an EXE on Windows 11. The code will run on Windows without Python installed. So, you think you need Python installed to run Python code on Windows 11? Well, think again. You also think that Windows 11 real time protection will protect you against malicious code? Well think again! Warning: Don't download software that you don't trust. Only download software from reputable software developers and those you trust. // MENU // 0:00 ▶ Introduction: Warning 2:03 ▶ Windows 11 setup: Python not installed, Windows version, anti-virus 3:12 ▶ Demo of python code running on Windows 11: 5:42 ▶ Demo of WiFi code 6:47 ▶ Nuitka installation steps 10:27 ▶ Compile Python code 13:52 ▶ Run compiled code on Windows 11 14:25 ▶ Be aware of Python requirements that you need to install // SCRIPTS // Python key: davidbombal.wiki/pythonkeys Python WiFi: davidbombal.wiki/pythonwifi // PDF Instructions// Download here: davidbombal.wiki/pythoncompile // SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal RUclips: ruclips.net/user/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com Disclaimer: This video is for educational purposes only. I own all equipment used for this demonstration. No actual attack took place on any websites. Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
You great Sir, I really wanna know how I can access and operate my laptop virtually like you do using your MAC ((disclaimer:: I don't have any hac5 keylogger))
@@jk_tecs I am trying to get the code to work on linux, but is this code just for windows? As I have a Win10 PC, and did you have to remane the .ps to .wpy? This is actually my first day coding python!
Great stuff. I also found that hex encoding the python keylogging script first before pasting it into a file circumvents Defender's Real-Time Protection. Then just assign a variable to decode the hex to utf-8 string. Then run exec on the variable. It's simple but runs the malicious python without being caught by Defender.
Great video, building compiled python code was almost more interesting than the code itself. I knew it was possible to compile python code but never had time to research the process. That was a great introduction to a whole new functionality for my python code.
So if you disable Windows Antivirus, you only stop the Windows intrusiveness on your system. That's why you cannot trust your own "system protection features" . Thanks again, David Bombal, for another great content video. Always learning something new.
@@davidbombal it does but when I'm working with stuff I'm aware is for exploits I don't need AV slowing me down, when I download cracked software from TPB I don't need that headache.
The age of the electron and switch... I really hope that the skiddies of today adopt the white hat mind frame, content such as yours I believe goes a long way to that end.
Also a very good reason to use a seperate 2 factor auth. Even with signed code from a trusted developer we are all 1 malicious supply chain attack away from being compromised.
Here comes my awaited video. I've really been longing to run my first EXE app and this tutorial will come in handy for that. Thanks, much #MyTechnologyTutor
This is a spectacular video, I do appreciate your great advice, you are teaching us something we don't know, you are right we must be aware of where we put our steps on.
By the Python WiFi File i get this error: UnicodeDecodeError: 'utf-8' codec can't decode byte 0x81 in position 76: invalid start byte. Can someone help me please.
Thank you for this great video. Highly valuable information. Really appreciate your efforts in creating a detailed document on top of the video and sharing it with us! Question: If this code was compiled for Linux distros/mac OS and run on them, would it be any secure than windows?
Thank you. Glad it was helpful Vyas. I would have to create specific code for Linux and macOS to test. This code would not work on either of those platforms.
david, as you mention before, i check the version instalation of nuitka on powershell but nuitka not found and shown this kind of text ( The term 'nuitka' is not recognized as the name of a cmdlet, function, script file, or operable program. Check the spelling of the name, or if a path was included, verify that the path is correct and try again. ) how to solve this problem? thankyou for your contribution for community
Hey David! I love your content. In my humble opinion you don't need to repeat things so many times like "I'm running W11" or "AGAIN, do not use this for malicious purposes, the code is for educational purposes only, so don't use it for something malicious" I Know man, you said that like 5 times, go on... not sure if this is bodering only me or not but I wanted to tell you that. Thanks for sharing!
Great video, it's amazing that you are also up to date with the topics of your videos, that is why you made windows 11 as it is new and there are not many courses... Just amazing
It's also easy (using a tool) to append your malicious executable to an other legit one . So you may think you're launching a real/known program that is working exactly as expected but ... will also execute a malicious code that no one will ever suspect 😱
few modules that come with python the antivirus will detect as malware, that includes shutil, ctypes, sys, os, glob...of course is just happen when you convert it to .exe and as single file....David, do you use Pyinstaller?
The worst about that type of code is that extremely many commercial programs, do use keylogger-code to trigger events and so on, so it is not straight forward to detect a keylogger and then trigger. Even windows itself is using keyloggers to functioning. You do almost have to detect intend of the program:-)
Hi, very good video! I've a question. I've noticed that the keylogger doesn't log the admin password that is required for installing softwares for example, and that made me feel safe. Now, this is a simple script, so can it be updated to log also these hidden keys or is it not possible? Thanks for answer and i'm sorry for my English that isn't very good 😅
Thanks for the lesson. Just for educational purposes, can you automate the python keylogger to run on one computer and send the keylogs to another computer. In a way such that you can handle security issues within your network. You can see which specific computer in your network was used to do something. I hope you understand what I'm trying to say
Wow I like this video, david is there any method download key logger in victim machine but key logger txt store back in attack machine just like a reverse shell reverse back to attack machine?
-Great content Professor David Bombal...!!! -People always ask me what is the best language to learn and I always return the question, "Best language for what...?". -C and C++ are the languages where OSs are usually written and even today code for devices such as IOTs is written in C (devices how run without a OS), as is the case with Arduino, and others. besides many backends and made in C or java. -Python is a scripting language and in the 90s when I learned to program I learned Assembly (Low level machine language) and C++ (which is a high level language), but scripting languages at that time when they emerged were called High High Level why they needed an OS running for them to run on top. -The teacher example uses a module that basically downloads the GCC C compiler and compiles it into the stand alone executable using the Python as source. - Interesting solution this module, the new Raspberry Pi, the Nano if I'm not mistaken, can compile not only from C but from a Python variant for micro devices. -Thank you very much for the knowledge...!!!
Not saying that it's hard to evade Windows Defender, but why should it flag it in the first place if your scripts aren't sending the data outside? it's a local keylogger and a local wifi passwords revealer.
David sir.. A question: What if someone develop the same code for a linux distro like the .Deb or .rpm and if I try to execute it, will my distro stop it ? What's your views on it ? Btw Much ❤️ David sir.
Good video. I have a different question. I created exe file using PyInstaller, it works fine in that computer. If I move that file to other computer regardless of windows or Mac, the exe file is considered as security thread. What I can do to resolve this issue.
it is funny because I made a script in python for task automation at work, I d like my colleagues to be able to use it however the .exe generated with nuitka keeps getting flagged as a Virus... No way for them to use it
Learn how to convert your Python code to run as an EXE on Windows 11. The code will run on Windows without Python installed.
So, you think you need Python installed to run Python code on Windows 11? Well, think again. You also think that Windows 11 real time protection will protect you against malicious code? Well think again!
Warning: Don't download software that you don't trust. Only download software from reputable software developers and those you trust.
// MENU //
0:00 ▶ Introduction: Warning
2:03 ▶ Windows 11 setup: Python not installed, Windows version, anti-virus
3:12 ▶ Demo of python code running on Windows 11:
5:42 ▶ Demo of WiFi code
6:47 ▶ Nuitka installation steps
10:27 ▶ Compile Python code
13:52 ▶ Run compiled code on Windows 11
14:25 ▶ Be aware of Python requirements that you need to install
// SCRIPTS //
Python key: davidbombal.wiki/pythonkeys
Python WiFi: davidbombal.wiki/pythonwifi
// PDF Instructions//
Download here: davidbombal.wiki/pythoncompile
// SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: twitter.com/davidbombal
Instagram: instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
RUclips: ruclips.net/user/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
Disclaimer: This video is for educational purposes only. I own all equipment used for this demonstration. No actual attack took place on any websites.
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Thank you David for this big eye-opener! Stay safe and keep up the great work.
You great Sir,
I really wanna know how I can access and operate my laptop virtually like you do using your MAC ((disclaimer:: I don't have any hac5 keylogger))
I'm using VNC. I demonstrate how in videos on my channel like this: ruclips.net/video/mIdF7K3Nmlw/видео.html
Thanks, Much
Just watched it and got what I wanted. Never knew it was so simple!!
@@jk_tecs I am trying to get the code to work on linux, but is this code just for windows? As I have a Win10 PC, and did you have to remane the .ps to .wpy? This is actually my first day coding python!
EVERYONE follows "this is only for educational purpose" 🤣🤣
Yes. Do not get into trouble!
My dignity and my faith in you does not allow me to do malicous works
Great stuff. I also found that hex encoding the python keylogging script first before pasting it into a file circumvents Defender's Real-Time Protection. Then just assign a variable to decode the hex to utf-8 string. Then run exec on the variable. It's simple but runs the malicious python without being caught by Defender.
care to elaborate? can pm
I have some doubts can u help me..?
Great video, building compiled python code was almost more interesting than the code itself. I knew it was possible to compile python code but never had time to research the process. That was a great introduction to a whole new functionality for my python code.
This is amazing and dangerous at the same time. Thank you so much sir.
Thank you!
David this video was quality and I enjoy this type of series you’ve been doing the last few months!!
Many thanks David for the very informative episode, it is always appreciated.
And G'day from Australia mate :)
So if you disable Windows Antivirus, you only stop the Windows intrusiveness on your system.
That's why you cannot trust your own "system protection features" .
Thanks again, David Bombal, for another great content video.
Always learning something new.
THIS
Windows Real Time protection stops a lot of nonsense. I wouldn't recommend turning that off.
@@davidbombal it does but when I'm working with stuff I'm aware is for exploits I don't need AV slowing me down, when I download cracked software from TPB I don't need that headache.
Very informative and great content David! I appreciate it!
Glad you enjoyed it!
The age of the electron and switch... I really hope that the skiddies of today adopt the white hat mind frame, content such as yours I believe goes a long way to that end.
Thank you. I hope people will learn to protect companies - as we need that.
SKS, OCS, ROM
Also a very good reason to use a seperate 2 factor auth.
Even with signed code from a trusted developer we are all 1 malicious supply chain attack away from being compromised.
Thank you David, I am going to test it in my virtual environment and inform the family and friends.
Thank you man i really appreciate you did a thing that most people didnt! thx bro i needed this for longg
Glad you found the video useful!
Thank you so much..You are simply the best!
Thank you! And you're welcome!
thank you sir. I was making project on Keyogger and this and your old video helped me a lot.
Glad it helped!
Back at it again yayyyy! Thanks
Hope you enjoyed the video Vlad
Aah I needed this a lot for some scripts! Thank you good sir!
Its a great video !!! Thanks for spending your precious time making this video for us. There's a question actually, is this similar to pyinstaller ?
Thank you. I found that Windows removes software created with pyinstaller. So, I found that Nuitka is much better in my tests.
@@davidbombal much appreciate 🙏🏻
david you are the best i had this compiling problem i couldnt compile my python file (i created a face detector) thank you for the amazing video
Glad it helped!
Congrats on making it to 800K :) Trying to follow in your footsteps 😀
Here comes my awaited video. I've really been longing to run my first EXE app and this tutorial will come in handy for that. Thanks, much #MyTechnologyTutor
You're welcome!
Was waiting for this video...
finally😌🥳
Hope you enjoy the video!
This is a spectacular video, I do appreciate your great advice, you are teaching us something we don't know, you are right we must be aware of where we put our steps on.
Glad it was helpful!
This is amazing ,wonderful and dangerous at the same time 😳.
This is so much information ,thank you very much for this...
By the Python WiFi File i get this error: UnicodeDecodeError: 'utf-8' codec can't decode byte 0x81 in position 76: invalid start byte. Can someone help me please.
Outstanding. Want more stuff like this
Really love your work keep it up sir 😉, ignore the haters and keep going.
Thank you so much 😀
Thank you for this great video. Highly valuable information. Really appreciate your efforts in creating a detailed document on top of the video and sharing it with us!
Question: If this code was compiled for Linux distros/mac OS and run on them, would it be any secure than windows?
Thank you. Glad it was helpful Vyas. I would have to create specific code for Linux and macOS to test. This code would not work on either of those platforms.
Excelente, contenido de gran calidad. Muchas gracias David.
Thank you very much!
I love this 👍🏼 thank you
You're welcome!
Thanks for this content ❤️
hey why is FUD on windows 11 but not windows 10? what did they change about windows defender?
The keylogger is detected by avast or windows defender david
نتمنى لك مزيد من التميز وشكرا على النصيحة (We wish you more excellence and thank you for the advice)
Too crazy. Thank you for this
You're welcome!
hey david im not that expert in to this even knew very little but i do love ur videos..
That was awesome, thanks David.
david, as you mention before, i check the version instalation of nuitka on powershell but nuitka not found and shown this kind of text ( The term 'nuitka' is not recognized as the name of a cmdlet, function, script file, or operable program.
Check the spelling of the name, or if a path was included, verify that the path is correct and try again. )
how to solve this problem? thankyou for your contribution for community
i did same all step by step and still got that error that Nuitka not found.... dang.
Hey David! I love your content. In my humble opinion you don't need to repeat things so many times like "I'm running W11" or "AGAIN, do not use this for malicious purposes, the code is for educational purposes only, so don't use it for something malicious" I Know man, you said that like 5 times, go on... not sure if this is bodering only me or not but I wanted to tell you that. Thanks for sharing!
Repition is important, because some people are hard of hearing...by choice. Hence, repeat...repeat...repeat.
Can't wait to hear your thoughts about zero day vulnerability log4j
Hi David is your Mac using the latest M1 processor?
David is the mister Rodgers of InFoSec
Another great video! Can you do one on dns poisoning how it works and how we can protect ourselves from it?
Great suggestion!
Terima Kasih Pak David, semoga ilmu anda dapat berguna untuk kami semuanya. 😇🙏🏼
Thank you
Thank you very much you might have saved life's with this vid
Great video, it's amazing that you are also up to date with the topics of your videos, that is why you made windows 11 as it is new and there are not many courses... Just amazing
Thanks for the information bro.
Thanks for everything🙏
You're welcome 😊
thx Mr.David
plz more and more
and we need about android and ios
thx again you are the best
You're welcome!
It's also easy (using a tool) to append your malicious executable to an other legit one . So you may think you're launching a real/known program that is working exactly as expected but ... will also execute a malicious code that no one will ever suspect 😱
Agreed.
Did u try Kaspersky in your case. How did it respond as opposed to defender ?
Nothing to say. Great as always
Thank you so much 😀
few modules that come with python the antivirus will detect as malware, that includes shutil, ctypes, sys, os, glob...of course is just happen when you convert it to .exe and as single file....David, do you use Pyinstaller?
In my tests, Windows sees code created with Pyinstaller as malware and removes it. This is why Nuitka was much better in my tests.
@@davidbombal thanks :)
do you have courses in udemy or coursera ?
The worst about that type of code is that extremely many commercial programs, do use keylogger-code to trigger events and so on, so it is not straight forward to detect a keylogger and then trigger. Even windows itself is using keyloggers to functioning. You do almost have to detect intend of the program:-)
Hi, very good video! I've a question. I've noticed that the keylogger doesn't log the admin password that is required for installing softwares for example, and that made me feel safe. Now, this is a simple script, so can it be updated to log also these hidden keys or is it not possible? Thanks for answer and i'm sorry for my English that isn't very good 😅
Python truly is the infosec ops professional’s best friend. I have yet to find something it can’t do.
Thank you for posting this yt video 😁
Thanks for the lesson. Just for educational purposes, can you automate the python keylogger to run on one computer and send the keylogs to another computer. In a way such that you can handle security issues within your network. You can see which specific computer in your network was used to do something. I hope you understand what I'm trying to say
Wow I like this video, david is there any method download key logger in victim machine but key logger txt store back in attack machine just like a reverse shell reverse back to attack machine?
Just a little query. Do you like windows 11? cuz I still use windows 10.
Love you, sir❤❤❤❤ you are my favourite hero ❤ 💙 ♥ 💕
Thank you!
hear we go again with a amazing video ❤️
Very knowledgeable video 📹 👌 .. I have request to tell something about CYBER SECURITY ....
im having my exams going on nd i have 3 main exams continues your blessings will motivate me a lot sir ☺️🙃🙏
All the best
-Great content Professor David Bombal...!!!
-People always ask me what is the best language to learn and I always return the question, "Best language for what...?".
-C and C++ are the languages where OSs are usually written and even today code for devices such as IOTs is written in C (devices how run without a OS), as is the case with Arduino, and others. besides many backends and made in C or java.
-Python is a scripting language and in the 90s when I learned to program I learned Assembly (Low level machine language) and C++ (which is a high level language), but scripting languages at that time when they emerged were called High High Level why they needed an OS running for them to run on top.
-The teacher example uses a module that basically downloads the GCC C compiler and compiles it into the stand alone executable using the Python as source.
- Interesting solution this module, the new Raspberry Pi, the Nano if I'm not mistaken, can compile not only from C but from a Python variant for micro devices.
-Thank you very much for the knowledge...!!!
Hey David I am install everything and checking the version in powershell but in power shell it's showing an error
im so love your conntent 👑
So, all files from the Internet must be run and checked in a virtual machine and only there, not in host OS.
Hi David! I have a problem with installing Nuitka
The term nuitka is not recognized as the name of a cmdlet, function scri.....
me too, idk how to solve this problem....
Not saying that it's hard to evade Windows Defender, but why should it flag it in the first place if your scripts aren't sending the data outside? it's a local keylogger and a local wifi passwords revealer.
Because of people like you my python game is marked as a virus 😢
hi David thanks - can you share the model of your monitor you are using?
Monitor: amzn.to/3yyF74Y
More stuff: www.amazon.com/shop/davidbombal
Man Its Just My Brai I Cant Get It, BUT Ur F!_!cking Genius Ya Understood All Of That. Just Wow.
David sir.. A question: What if someone develop the same code for a linux distro like the .Deb or .rpm and if I try to execute it, will my distro stop it ? What's your views on it ? Btw Much ❤️ David sir.
No it won't.
Off topic. What is the model of monitor you are using?
Monitor: amzn.to/3yyF74Y
More stuff: www.amazon.com/shop/davidbombal
So you didn't bypass the Windows defender you just turned off real time protection
damn we love you David, Keep this stuff up bud gooddddd warning
Thank you!
Good video. I have a different question. I created exe file using PyInstaller, it works fine in that computer. If I move that file to other computer regardless of windows or Mac, the exe file is considered as security thread. What I can do to resolve this issue.
Hey I am a beginner security analyst I have an executable files as you show is there any to reverse this so we may know about the real attacker
Do someone now how I can convert python file into macOS program but whitout py2app?
And nutika is able to bypass anti viruses?
Why jump between Powershell and CMD? Don't the perform the same task?
i literally have exams and i havent studied, just watching youtube. probably gonna regret this
Go and study!
@@davidbombal i just started, thanks for the motivation
Great vid, clear and usefull
thank you sir ❤️❤️
i tested my windows deletes it right away dosent even let me to move it or when i try to find it already deleted
Still works in my tests. Just call the file something else. You have to disable defender when compiling the code.
@@davidbombal oh sry My Bad My files were just python files😂
Does it change the file signature every time you compile the same script?
Nuitka is no longer supported on windows....ill try to use these steps on my Ubutnu
i was trying to compile a simple profram and the video starts like this😂😂
Sir can you please explain about log4j vulnerability
See my latest video. I show log4j with minecraft.
Videos great btw I’m just curious about that folder named “zz stuff” which was in downloads folder what’s in that i maybe wrong but zz sound kinky tbh
it is funny because I made a script in python for task automation at work, I d like my colleagues to be able to use it however the .exe generated with nuitka keeps getting flagged as a Virus... No way for them to use it
how does the keylogger work remotely if we want to use it practically though?
Is there anything I can do to get more wifi
Signal ?
Where is other giveways result?
I once wrote a french input method, just used the same function as you are using right now. Same tech has different use.
Agreed. Not all code is malicious. Just depends how it is used.
Which best antivirus software at an affordable price for system