Python keylogger bypasses Windows 11 Defender // Convert WIFI py to EXE

Поделиться
HTML-код
  • Опубликовано: 17 янв 2025

Комментарии • 367

  • @davidbombal
    @davidbombal  3 года назад +39

    Learn how to convert your Python code to run as an EXE on Windows 11. The code will run on Windows without Python installed.
    So, you think you need Python installed to run Python code on Windows 11? Well, think again. You also think that Windows 11 real time protection will protect you against malicious code? Well think again!
    Warning: Don't download software that you don't trust. Only download software from reputable software developers and those you trust.
    // MENU //
    0:00 ▶ Introduction: Warning
    2:03 ▶ Windows 11 setup: Python not installed, Windows version, anti-virus
    3:12 ▶ Demo of python code running on Windows 11:
    5:42 ▶ Demo of WiFi code
    6:47 ▶ Nuitka installation steps
    10:27 ▶ Compile Python code
    13:52 ▶ Run compiled code on Windows 11
    14:25 ▶ Be aware of Python requirements that you need to install
    // SCRIPTS //
    Python key: davidbombal.wiki/pythonkeys
    Python WiFi: davidbombal.wiki/pythonwifi
    // PDF Instructions//
    Download here: davidbombal.wiki/pythoncompile
    // SOCIAL //
    Discord: discord.com/invite/usKSyzb
    Twitter: twitter.com/davidbombal
    Instagram: instagram.com/davidbombal
    LinkedIn: www.linkedin.com/in/davidbombal
    Facebook: facebook.com/davidbombal.co
    TikTok: tiktok.com/@davidbombal
    RUclips: ruclips.net/user/davidbombal
    // SPONSORS //
    Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
    Disclaimer: This video is for educational purposes only. I own all equipment used for this demonstration. No actual attack took place on any websites.
    Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

    • @rangersmyth
      @rangersmyth 3 года назад

      Thank you David for this big eye-opener! Stay safe and keep up the great work.

    • @jk_tecs
      @jk_tecs 3 года назад +3

      You great Sir,
      I really wanna know how I can access and operate my laptop virtually like you do using your MAC ((disclaimer:: I don't have any hac5 keylogger))

    • @davidbombal
      @davidbombal  3 года назад +4

      I'm using VNC. I demonstrate how in videos on my channel like this: ruclips.net/video/mIdF7K3Nmlw/видео.html

    • @jk_tecs
      @jk_tecs 3 года назад +1

      Thanks, Much
      Just watched it and got what I wanted. Never knew it was so simple!!

    • @rangersmyth
      @rangersmyth 3 года назад

      @@jk_tecs I am trying to get the code to work on linux, but is this code just for windows? As I have a Win10 PC, and did you have to remane the .ps to .wpy? This is actually my first day coding python!

  • @satyajeetghorpade7975
    @satyajeetghorpade7975 3 года назад +33

    EVERYONE follows "this is only for educational purpose" 🤣🤣

    • @davidbombal
      @davidbombal  3 года назад +8

      Yes. Do not get into trouble!

    • @satyajeetghorpade7975
      @satyajeetghorpade7975 3 года назад +5

      My dignity and my faith in you does not allow me to do malicous works

  • @TheBenJiles
    @TheBenJiles 2 года назад +13

    Great stuff. I also found that hex encoding the python keylogging script first before pasting it into a file circumvents Defender's Real-Time Protection. Then just assign a variable to decode the hex to utf-8 string. Then run exec on the variable. It's simple but runs the malicious python without being caught by Defender.

    • @laaawwrrryyyyyy
      @laaawwrrryyyyyy 2 года назад

      care to elaborate? can pm

    • @vasu5688
      @vasu5688 Год назад

      I have some doubts can u help me..?

  • @barkerdillinger4927
    @barkerdillinger4927 Год назад +1

    Great video, building compiled python code was almost more interesting than the code itself. I knew it was possible to compile python code but never had time to research the process. That was a great introduction to a whole new functionality for my python code.

  • @sujonalmamun
    @sujonalmamun 3 года назад +10

    This is amazing and dangerous at the same time. Thank you so much sir.

  • @moosematrix
    @moosematrix 2 года назад

    David this video was quality and I enjoy this type of series you’ve been doing the last few months!!

  • @jcramond73
    @jcramond73 3 года назад +1

    Many thanks David for the very informative episode, it is always appreciated.
    And G'day from Australia mate :)

  • @jaimerosariojusticia
    @jaimerosariojusticia 3 года назад +9

    So if you disable Windows Antivirus, you only stop the Windows intrusiveness on your system.
    That's why you cannot trust your own "system protection features" .
    Thanks again, David Bombal, for another great content video.
    Always learning something new.

    • @alexdonofrio6140
      @alexdonofrio6140 3 года назад

      THIS

    • @davidbombal
      @davidbombal  3 года назад +1

      Windows Real Time protection stops a lot of nonsense. I wouldn't recommend turning that off.

    • @alexdonofrio6140
      @alexdonofrio6140 3 года назад +3

      @@davidbombal it does but when I'm working with stuff I'm aware is for exploits I don't need AV slowing me down, when I download cracked software from TPB I don't need that headache.

  • @juliusrowe9374
    @juliusrowe9374 3 года назад +4

    Very informative and great content David! I appreciate it!

  • @3rawkz
    @3rawkz 3 года назад +30

    The age of the electron and switch... I really hope that the skiddies of today adopt the white hat mind frame, content such as yours I believe goes a long way to that end.

    • @davidbombal
      @davidbombal  3 года назад +6

      Thank you. I hope people will learn to protect companies - as we need that.

    • @fuhkit7463
      @fuhkit7463 3 года назад

      SKS, OCS, ROM

  • @ghostofdre
    @ghostofdre 3 года назад +2

    Also a very good reason to use a seperate 2 factor auth.
    Even with signed code from a trusted developer we are all 1 malicious supply chain attack away from being compromised.

  • @هردمبیل-ت2ش
    @هردمبیل-ت2ش 3 года назад +1

    Thank you David, I am going to test it in my virtual environment and inform the family and friends.

  • @swatishaw1351
    @swatishaw1351 3 года назад

    Thank you man i really appreciate you did a thing that most people didnt! thx bro i needed this for longg

    • @davidbombal
      @davidbombal  3 года назад

      Glad you found the video useful!

  • @ashraf_dz4769
    @ashraf_dz4769 3 года назад +1

    Thank you so much..You are simply the best!

    • @davidbombal
      @davidbombal  3 года назад +1

      Thank you! And you're welcome!

  • @tpwkpeace5011
    @tpwkpeace5011 3 года назад

    thank you sir. I was making project on Keyogger and this and your old video helped me a lot.

  • @ImagineIfNot
    @ImagineIfNot 3 года назад +2

    Back at it again yayyyy! Thanks

    • @davidbombal
      @davidbombal  3 года назад +2

      Hope you enjoyed the video Vlad

  • @daniocampo1992
    @daniocampo1992 3 года назад

    Aah I needed this a lot for some scripts! Thank you good sir!

  • @sz3066
    @sz3066 3 года назад +1

    Its a great video !!! Thanks for spending your precious time making this video for us. There's a question actually, is this similar to pyinstaller ?

    • @davidbombal
      @davidbombal  3 года назад +1

      Thank you. I found that Windows removes software created with pyinstaller. So, I found that Nuitka is much better in my tests.

    • @sz3066
      @sz3066 3 года назад +1

      @@davidbombal much appreciate 🙏🏻

  • @nima848
    @nima848 3 года назад

    david you are the best i had this compiling problem i couldnt compile my python file (i created a face detector) thank you for the amazing video

  • @OurTechPlanet
    @OurTechPlanet 3 года назад

    Congrats on making it to 800K :) Trying to follow in your footsteps 😀

  • @jk_tecs
    @jk_tecs 3 года назад +1

    Here comes my awaited video. I've really been longing to run my first EXE app and this tutorial will come in handy for that. Thanks, much #MyTechnologyTutor

  • @pela2923
    @pela2923 3 года назад

    Was waiting for this video...
    finally😌🥳

  • @ra.bandar2600
    @ra.bandar2600 3 года назад +1

    This is a spectacular video, I do appreciate your great advice, you are teaching us something we don't know, you are right we must be aware of where we put our steps on.

  • @manojkothwal3586
    @manojkothwal3586 3 года назад +2

    This is amazing ,wonderful and dangerous at the same time 😳.

  • @opekolawole9497
    @opekolawole9497 3 года назад

    This is so much information ,thank you very much for this...

  • @ed1026
    @ed1026 2 года назад +2

    By the Python WiFi File i get this error: UnicodeDecodeError: 'utf-8' codec can't decode byte 0x81 in position 76: invalid start byte. Can someone help me please.

  • @hamza77v
    @hamza77v 3 года назад +2

    Outstanding. Want more stuff like this

  • @chiranjeevinaidu3660
    @chiranjeevinaidu3660 3 года назад +2

    Really love your work keep it up sir 😉, ignore the haters and keep going.

  • @vyasG
    @vyasG 3 года назад +2

    Thank you for this great video. Highly valuable information. Really appreciate your efforts in creating a detailed document on top of the video and sharing it with us!
    Question: If this code was compiled for Linux distros/mac OS and run on them, would it be any secure than windows?

    • @davidbombal
      @davidbombal  3 года назад +3

      Thank you. Glad it was helpful Vyas. I would have to create specific code for Linux and macOS to test. This code would not work on either of those platforms.

  • @CARLOSPH36
    @CARLOSPH36 3 года назад

    Excelente, contenido de gran calidad. Muchas gracias David.

  • @sosekhamed5702
    @sosekhamed5702 3 года назад

    I love this 👍🏼 thank you

  • @tojabdhei4881
    @tojabdhei4881 3 года назад +1

    Thanks for this content ❤️

  • @thevault1575
    @thevault1575 3 года назад +1

    hey why is FUD on windows 11 but not windows 10? what did they change about windows defender?

  • @rx3443
    @rx3443 3 года назад +1

    The keylogger is detected by avast or windows defender david

  • @boussaada1972
    @boussaada1972 Год назад

    نتمنى لك مزيد من التميز وشكرا على النصيحة (We wish you more excellence and thank you for the advice)

  • @Ortiz1130
    @Ortiz1130 3 года назад +1

    Too crazy. Thank you for this

  • @arjocelyntanjulio2124
    @arjocelyntanjulio2124 3 года назад

    hey david im not that expert in to this even knew very little but i do love ur videos..

  • @guilherme5094
    @guilherme5094 3 года назад

    That was awesome, thanks David.

  • @naufalnoumi8524
    @naufalnoumi8524 3 года назад +2

    david, as you mention before, i check the version instalation of nuitka on powershell but nuitka not found and shown this kind of text ( The term 'nuitka' is not recognized as the name of a cmdlet, function, script file, or operable program.
    Check the spelling of the name, or if a path was included, verify that the path is correct and try again. )
    how to solve this problem? thankyou for your contribution for community

    • @zxletul
      @zxletul 2 года назад

      i did same all step by step and still got that error that Nuitka not found.... dang.

  • @wally19
    @wally19 3 года назад +2

    Hey David! I love your content. In my humble opinion you don't need to repeat things so many times like "I'm running W11" or "AGAIN, do not use this for malicious purposes, the code is for educational purposes only, so don't use it for something malicious" I Know man, you said that like 5 times, go on... not sure if this is bodering only me or not but I wanted to tell you that. Thanks for sharing!

    • @lancemarchetti8673
      @lancemarchetti8673 2 года назад

      Repition is important, because some people are hard of hearing...by choice. Hence, repeat...repeat...repeat.

  • @tianot3636
    @tianot3636 3 года назад

    Can't wait to hear your thoughts about zero day vulnerability log4j

  • @polymorphism1966
    @polymorphism1966 3 года назад

    Hi David is your Mac using the latest M1 processor?

  • @cravenmoorehead5657
    @cravenmoorehead5657 3 года назад

    David is the mister Rodgers of InFoSec

  • @999Wayno
    @999Wayno 3 года назад +1

    Another great video! Can you do one on dns poisoning how it works and how we can protect ourselves from it?

  • @lexsaintdry
    @lexsaintdry 3 года назад

    Terima Kasih Pak David, semoga ilmu anda dapat berguna untuk kami semuanya. 😇🙏🏼

  • @ashurdawood6191
    @ashurdawood6191 3 года назад

    Thank you very much you might have saved life's with this vid

  • @idhantsood1105
    @idhantsood1105 3 года назад

    Great video, it's amazing that you are also up to date with the topics of your videos, that is why you made windows 11 as it is new and there are not many courses... Just amazing

  • @Jinkle
    @Jinkle 3 года назад +1

    Thanks for the information bro.

  • @lyricsica
    @lyricsica 3 года назад

    Thanks for everything🙏

  • @ali0ghanem
    @ali0ghanem 3 года назад

    thx Mr.David
    plz more and more
    and we need about android and ios
    thx again you are the best

  • @xavierdubruille
    @xavierdubruille 3 года назад +3

    It's also easy (using a tool) to append your malicious executable to an other legit one . So you may think you're launching a real/known program that is working exactly as expected but ... will also execute a malicious code that no one will ever suspect 😱

  • @erhanertem196
    @erhanertem196 2 года назад

    Did u try Kaspersky in your case. How did it respond as opposed to defender ?

  • @killerx8902
    @killerx8902 3 года назад +1

    Nothing to say. Great as always

  • @coding4well
    @coding4well 3 года назад

    few modules that come with python the antivirus will detect as malware, that includes shutil, ctypes, sys, os, glob...of course is just happen when you convert it to .exe and as single file....David, do you use Pyinstaller?

    • @davidbombal
      @davidbombal  3 года назад +1

      In my tests, Windows sees code created with Pyinstaller as malware and removes it. This is why Nuitka was much better in my tests.

    • @coding4well
      @coding4well 3 года назад

      @@davidbombal thanks :)

  • @Alain9-1
    @Alain9-1 3 года назад

    do you have courses in udemy or coursera ?

  • @friedmule5403
    @friedmule5403 3 года назад

    The worst about that type of code is that extremely many commercial programs, do use keylogger-code to trigger events and so on, so it is not straight forward to detect a keylogger and then trigger. Even windows itself is using keyloggers to functioning. You do almost have to detect intend of the program:-)

  • @hel-per8310
    @hel-per8310 2 года назад +1

    Hi, very good video! I've a question. I've noticed that the keylogger doesn't log the admin password that is required for installing softwares for example, and that made me feel safe. Now, this is a simple script, so can it be updated to log also these hidden keys or is it not possible? Thanks for answer and i'm sorry for my English that isn't very good 😅

  • @numberiforgot
    @numberiforgot 3 года назад

    Python truly is the infosec ops professional’s best friend. I have yet to find something it can’t do.

  • @getalife6654
    @getalife6654 3 года назад

    Thank you for posting this yt video 😁

  • @hotdailymemes5129
    @hotdailymemes5129 2 года назад +6

    Thanks for the lesson. Just for educational purposes, can you automate the python keylogger to run on one computer and send the keylogs to another computer. In a way such that you can handle security issues within your network. You can see which specific computer in your network was used to do something. I hope you understand what I'm trying to say

  • @tarrylim778
    @tarrylim778 3 года назад +1

    Wow I like this video, david is there any method download key logger in victim machine but key logger txt store back in attack machine just like a reverse shell reverse back to attack machine?

  • @prakhars962
    @prakhars962 3 года назад

    Just a little query. Do you like windows 11? cuz I still use windows 10.

  • @a.cmihad5125
    @a.cmihad5125 3 года назад

    Love you, sir❤❤❤❤ you are my favourite hero ❤ 💙 ♥ 💕

  • @_v0id309
    @_v0id309 3 года назад

    hear we go again with a amazing video ❤️

  • @deadshot4967
    @deadshot4967 3 года назад

    Very knowledgeable video 📹 👌 .. I have request to tell something about CYBER SECURITY ....

  • @_v0id309
    @_v0id309 3 года назад

    im having my exams going on nd i have 3 main exams continues your blessings will motivate me a lot sir ☺️🙃🙏

  • @educastellini
    @educastellini 3 года назад

    -Great content Professor David Bombal...!!!
    -People always ask me what is the best language to learn and I always return the question, "Best language for what...?".
    -C and C++ are the languages ​​where OSs are usually written and even today code for devices such as IOTs is written in C (devices how run without a OS), as is the case with Arduino, and others. besides many backends and made in C or java.
    -Python is a scripting language and in the 90s when I learned to program I learned Assembly (Low level machine language) and C++ (which is a high level language), but scripting languages ​​at that time when they emerged were called High High Level why they needed an OS running for them to run on top.
    -The teacher example uses a module that basically downloads the GCC C compiler and compiles it into the stand alone executable using the Python as source.
    - Interesting solution this module, the new Raspberry Pi, the Nano if I'm not mistaken, can compile not only from C but from a Python variant for micro devices.
    -Thank you very much for the knowledge...!!!

  • @DCR600
    @DCR600 3 года назад

    Hey David I am install everything and checking the version in powershell but in power shell it's showing an error

  • @israeldayan4690
    @israeldayan4690 3 года назад

    im so love your conntent 👑

  • @andreyshishkin4958
    @andreyshishkin4958 3 года назад

    So, all files from the Internet must be run and checked in a virtual machine and only there, not in host OS.

  • @XiangPlays
    @XiangPlays 2 года назад

    Hi David! I have a problem with installing Nuitka

  • @DCR600
    @DCR600 3 года назад +1

    The term nuitka is not recognized as the name of a cmdlet, function scri.....

    • @naufalnoumi8524
      @naufalnoumi8524 3 года назад

      me too, idk how to solve this problem....

  • @cyberus15
    @cyberus15 Год назад

    Not saying that it's hard to evade Windows Defender, but why should it flag it in the first place if your scripts aren't sending the data outside? it's a local keylogger and a local wifi passwords revealer.

  • @itamarshiponi8758
    @itamarshiponi8758 2 года назад +2

    Because of people like you my python game is marked as a virus 😢

  • @kda6072
    @kda6072 3 года назад

    hi David thanks - can you share the model of your monitor you are using?

    • @davidbombal
      @davidbombal  3 года назад

      Monitor: amzn.to/3yyF74Y
      More stuff: www.amazon.com/shop/davidbombal

  • @mol.am1999
    @mol.am1999 3 года назад

    Man Its Just My Brai I Cant Get It, BUT Ur F!_!cking Genius Ya Understood All Of That. Just Wow.

  • @AlphaCfter
    @AlphaCfter 3 года назад +2

    David sir.. A question: What if someone develop the same code for a linux distro like the .Deb or .rpm and if I try to execute it, will my distro stop it ? What's your views on it ? Btw Much ❤️ David sir.

  • @green-media-pl
    @green-media-pl 3 года назад

    Off topic. What is the model of monitor you are using?

    • @davidbombal
      @davidbombal  3 года назад +1

      Monitor: amzn.to/3yyF74Y
      More stuff: www.amazon.com/shop/davidbombal

  • @aidenhawkins7521
    @aidenhawkins7521 3 года назад

    So you didn't bypass the Windows defender you just turned off real time protection

  • @everetteberhardt5629
    @everetteberhardt5629 3 года назад

    damn we love you David, Keep this stuff up bud gooddddd warning

  • @khanalimphdpe172
    @khanalimphdpe172 2 года назад

    Good video. I have a different question. I created exe file using PyInstaller, it works fine in that computer. If I move that file to other computer regardless of windows or Mac, the exe file is considered as security thread. What I can do to resolve this issue.

  • @snowfy_music
    @snowfy_music 7 месяцев назад

    Hey I am a beginner security analyst I have an executable files as you show is there any to reverse this so we may know about the real attacker

  • @silvansommer4689
    @silvansommer4689 3 года назад +1

    Do someone now how I can convert python file into macOS program but whitout py2app?

  • @acbaab
    @acbaab 4 месяца назад

    And nutika is able to bypass anti viruses?

  • @KulwantSingh-xr4si
    @KulwantSingh-xr4si 3 года назад

    Why jump between Powershell and CMD? Don't the perform the same task?

  • @RainbowSheep_was_taken
    @RainbowSheep_was_taken 3 года назад +1

    i literally have exams and i havent studied, just watching youtube. probably gonna regret this

  • @lufox0148
    @lufox0148 3 года назад

    Great vid, clear and usefull

  • @x7ipx7ip66
    @x7ipx7ip66 3 года назад

    thank you sir ❤️❤️

  • @ScratchTuto
    @ScratchTuto 3 года назад

    i tested my windows deletes it right away dosent even let me to move it or when i try to find it already deleted

    • @davidbombal
      @davidbombal  3 года назад

      Still works in my tests. Just call the file something else. You have to disable defender when compiling the code.

    • @ScratchTuto
      @ScratchTuto 3 года назад

      @@davidbombal oh sry My Bad My files were just python files😂

  • @justinreyes4399
    @justinreyes4399 2 года назад

    Does it change the file signature every time you compile the same script?

  • @chrisyo4461
    @chrisyo4461 2 года назад

    Nuitka is no longer supported on windows....ill try to use these steps on my Ubutnu

  • @tyrichamshon2000
    @tyrichamshon2000 Год назад

    i was trying to compile a simple profram and the video starts like this😂😂

  • @ihyth4325
    @ihyth4325 3 года назад +1

    Sir can you please explain about log4j vulnerability

    • @davidbombal
      @davidbombal  3 года назад

      See my latest video. I show log4j with minecraft.

  • @omkar522
    @omkar522 3 года назад

    Videos great btw I’m just curious about that folder named “zz stuff” which was in downloads folder what’s in that i maybe wrong but zz sound kinky tbh

  • @LeZinZin95
    @LeZinZin95 2 года назад

    it is funny because I made a script in python for task automation at work, I d like my colleagues to be able to use it however the .exe generated with nuitka keeps getting flagged as a Virus... No way for them to use it

  • @sufianiskandar3586
    @sufianiskandar3586 3 года назад

    how does the keylogger work remotely if we want to use it practically though?

  • @onepoint2320
    @onepoint2320 3 года назад

    Is there anything I can do to get more wifi
    Signal ?

  • @lokeshnaidu3855
    @lokeshnaidu3855 3 года назад +1

    Where is other giveways result?

  • @Nobody-tg2xr
    @Nobody-tg2xr 3 года назад

    I once wrote a french input method, just used the same function as you are using right now. Same tech has different use.

    • @davidbombal
      @davidbombal  3 года назад

      Agreed. Not all code is malicious. Just depends how it is used.

  • @prajwalsananse6819
    @prajwalsananse6819 3 года назад

    Which best antivirus software at an affordable price for system