- System Information Collection
- Screenshot Capture
- Webcam Access
- Keylogging
- Geolocation Tracking
- Automated EXE Builder
- Gmail Reporting System
- System Intelligence Gathering
-
Harvests network configurations, installed software, and hardware specs
-
Maps user privileges and system vulnerabilities
-
Exports data in structured reports
- Surveillance Modules
-
Stealth Screenshot Capture: Operates silently with random intervals
-
Webcam Access: Single-frame capture without LED activation (on some devices)
-
Keylogging: Logs keystrokes with timestamp metadata
- Operational Security No Persistent Installation: Leaves minimal forensic traces
-
Gmail Exfiltration: Uses TLS-encrypted SMTP for secure data transfer
-
Dynamic Sleep Intervals: Avoids pattern-based detection
- Security Research Labs
-
Test malware detection evasion techniques
-
Benchmark antivirus response times
- Corporate Penetration Tests
-
Demonstrate phishing risks
-
Highlight data exfiltration vectors
- Educational Environments
-
Teach intrusion detection methods
-
Analyze attack telemetry
-
Legal Compliance
-
Always obtain written authorization before testing
-
Never deploy on systems you don’t own/control
-
Adhere to GDPR/HIPAA regulations when handling data
-
Responsible Disclosure
-
Report vulnerabilities to system owners immediately
-
Never retain collected data beyond testing periods
-
Detection Risks
-
Enterprise EDR solutions may flag certain activities
-
Network monitoring can detect SMTP exfiltration
-
Physical webcam LEDs may activate on some models
-
Contributing
-
We welcome responsible security researchers to:
-
Submit vulnerability reports
-
Suggest detection avoidance improvements
-
Translate documentation
-
Support Channels
-
GitHub Issues: For technical problems
-
Telegram: @Python_Hacking_Tools (for verified researchers)
-
Monitor your repository’s impact with:
-
GitHub Traffic Analytics (Views/Clones)
-
Release Download Counts
-
Visitor Badges in README
-
This project operates under MIT License. Commercial use requires prior written consent.
-
Attribution Requirements:
-
Credit original author in derivatives
-
Link back to this repository
pip install -r requirements.txt
python main.py