How to Create a Keylogger That Sends Emails (C# 2021) Simple Explanation Demo

HomeOther ContentHow to Create a Keylogger That Sends Emails (C# 2021) Simple Explanation Demo
How to Create a Keylogger That Sends Emails (C# 2021) Simple Explanation Demo
How to Create a Keylogger That Sends Emails (C# 2021) Simple Explanation Demo
Practical cybersecurity course INTERNSHIP
https://joshmadakor.tech/cyber

In this video we will explain what a keylogger is and demonstrate on a Windows 10 PC.
I'll show you how to open the source code, customize it yourself, deploy the keylogger to other computers, and automatically email the logs to the address of your choice.

Keylogger source code: https://github.com/joshmadakor1/Key-Logger-With-Email

‍️ – Patreon – ‍️
https://www.patreon.com/joshmadakor – Any support greatly appreciated!!

️ – Coding – ️
My favorite coding tutorials (CodeWithMosh): https://bit.ly/338kfD6

️ – Social media – ️
Instagram: https://www.instagram.com/joshmadakor/
LinkedIn: https://www.linkedin.com/in/joshmadakor/
Patreon: https://www.patreon.com/joshmadakor
Twitter: https://twitter.com/joshmadakor

– Equipment –
Camera (Sony a6600): https://amzn.to/33HVvSv
Microphone (Blue Yeti): https://amzn.to/2HoZ3kw
Capture card (camera to PC): https://amzn.to/36YmuKm
Chair (AKRacing): https://amzn.to/39P8PZ1
Lighting (Lamp): https://amzn.to/3fpVGWZ

– CV examples –
Software engineering: https://bit.ly/3hm4lLe
Cybersecurity: https://bit.ly/2M463Fq
Information technology: https://bit.ly/3huhLFa
0:00 Start
0:03 Warning
0:18 Preview
1:12 Keylogger Description
2:22 Prepare the environment (Visual Studio source code)
15:25 Running a keylogger
5:00 p.m. Explanation of variables and email function
7:38 Allow less secure apps (Gmail)
8:18 How to hide window and run in background
9:45 How to get the executable
10:15 How to run automatically on login
11:09 Virustotal and malware detection explained
1:10 p.m. Exit

Disclaimer:
Just a quick warning, this video is definitely for educational purposes only, PLEASE try to avoid taking what I'm about to share and committing some sort of crime or something like that.
that's definitely not my intention, please respect the law and mash the like button!

Introduction :
We will explain what a keylogger is and how it is used.
We will also do a real demonstration of keylogging which involves capturing keystrokes and sending them to us by email.
We'll look at a tiny bit of code just to explain how some things work, but I want to keep this video pretty simple for the most part.
If you want the more complex details like hooks and keypress events handled, I actually have another video that completely explains all the source code you see here.
After watching this video you will have a pretty good idea of how a keylogger works,
and you can take that source code, compile it, and run it on your computer.
And then at the end, I'm going to show you how to take the .exe, install it on other computers and have it running silently in the background.
You should definitely watch this if you're interested in cybersecurity or just like cool stuff

What is a KeyLogger? :
Simply put, a keylogger is just software that records key presses on a keyboard.
As you can imagine, something like this presents a LOT of cybercrime use cases.
Imagine that you are some sort of malicious villain and you manage to infect 1,000 people with a keylogger.

EVERYTHING all these people type will be recorded and returned to you.
If you imagine what people normally do on their computer, as a criminal you could get a lot of interesting information, such as social media conversations, people checking their bank accounts, like when they log in, their username and their password will be captured. -that sort of thing
Additionally, while being recorded on the keyboard, all your Google searches will be captured,
all your ____ searches will be captured,
Any weird things you might type will be captured and sent back to the attacker so they can browse at their leisure.

Even if the attacker doesn't obtain your bank account information or any other type of financial information, you can still be extorted and blackmailed depending on how weird you are looking for.
There are probably legitimate use cases for a keylogger, like monitoring employees or monitoring suspected criminals or something like that, but in those cases, especially if you were the employee being monitored, most People would feel like their privacy has been deeply violated because people are typing. really intimate things without even thinking about it.

Thank you for watching!

This video is intended for safety research and educational purposes only. Please do not use what you have learned here for malicious purposes.

DISCLAIMER: This video description contains affiliate links and I may receive a small commission. I only share content that I use and believe in. thank you very much for your support

Please take the opportunity to connect and share this video with your friends and family if you find it useful.

No Comments

Leave a Reply

Your email address will not be published. Required fields are marked *