Build an Advanced Keylogger using C++ for Ethical Hacking!

3.8 (2052)
MOOC
Payment
Learning paid
Language
English
Duration
7.5 hours course
Course by Udemy
$ 129.99
$ 129.99
What will you learn?
A fully functional keylogger built from scratch in C++!
Feel confident in coding similar programs in C++.
A custom keylogger made for use in Windows compiled in the latest version of C++.
Get answers to every question you ask about C++ and about making this keylogger!
About the course

If you want to learn to code at an advanced level in C++ or build your own fully functional advanced keylogger from scratch for learning ethical hacking, I think you might love this course! In this
course you will see exactly how to create an advanced keylogger starting from nothing by literally following the steps I take as I make it!

This
keylogger is capable of recording all the keyboard and
mouse input!
It can even record independent of the language settings because it logs the
physical keys on the keyboard first. Next, by using an arbitrary
keymap with human friendly names, it translates the machine keys to
something that we can understand. It also possesses mail sending
capabilities so you can just schedule the logfile to be sent via
mail, lets say every 12 hours. In addition to this, it will also keep
the logfile encrypted. Therefore, we will create another program
which will be able to decrypt the logfile on your end.

For learning C++, this is an ideal course because it is completely hands on learning that provides a functional end product! Some future features that will be added to the keylogger course as I develop them will include but are not limited to taking screenshots, capturing clipboard content (copy-paste), recording website URLs, and so on! Take this course now to get immediate access to the videos and to get answers to every single question you ask in the course!

As an information technology professional myself, I realize what the final product of this course is capable of. I trust in creating this that you will use it for good and for learning. If you choose to use this keylogger for any illegal or immoral
purposes, you risk losing a lot. This is only for educational
purposes. The keylogger that you are going to see will be able to
cause some serious damage, so please use it in a legal and
responsible way.

Thank you very much for reading this and I hope to see you in the course soon! If
you have any suggestions in regard to the functionalities of the
keylogger, feel free to send me a message or post your requests here.

Program
Introduction
General stuff and requirements
Thank you for taking this course! Here is what you get out of it!
Introduction
Welcome all to this intro. Here I will describe this course/project. My name is Ermin and I will be your instructor for this course. In this course I will teach you how to create an advanced keylogger.This keylogger is capable of recording more or less all the keyboard and mouse input independent of the language settings as it records the physical keys on the keyboard first, and then, by using an arbitrary keymap with human friendly names, it translates the machine keys to something that we can understand. It also possesses mail sending capabilities so you can just schedule the logfile to be sent via mail, lets say every 12 hours. In addition to this, it will also keep the logfile encrypted. Therefore, we will create another program which will be able to decrypt the logfile on your end. Please do not abuse the knowledge you get from this course as it can get you in a big trouble. Do not use this keylogger for any illegal or immoral purposes. You do not have my permission to do so. In fact, I am explicitly asking you not to do it. This is only for educational purposes. The keylogger that you are going to see will be able to cause some serious damage, so please use it in a legal and responsible way. Some future features that will be added to the keylogger will include but are not limited to taking screenshots, capturing clipboard content (copy-paste), recording website URLs, and so on.If you have any suggestions in regard to the functionalists of the keylogger, feel free to send me a message or post your requests here.
Setting up the development environment.
Set Up part 1
Set Up part 2
How to hide the keylogger window and prevent it from popping
Hiding the Keylogger window
Mapping physical keys to human friendly names
KeyConstants part 1
We will use this header in order to map the system names of the physical keys of the keyboard to human friendly names. In essence, we are just doing some translation here. At the moment, it is configured to US keyboard if I am not mistaken. If you are wondering why I am uncertain of this, it is primarily because I am too lazy to check which keymap does the current version contain because I have tested it out with different keyboards and different keymaps to make sure that it does function. This doesn't matter that much because you can translate system names for the keys pretty much any way you want so that it can fit more or less any language configuration.
KeyConstants part 2
Creating auxiliary general purpose functions
Requirements
  • This course will be much easier if you have some prior knowledge of C++.
Lecturers
Ermin Kreponic
Ermin Kreponic
IT Expert
Platform
/storage/img/providers/udemy.svg
Udemy courses are suited to professional development. The platform is organized in such a way that it is experts themselves that decide the topic and when the course will start. All supporting documents are made available to you for lifetime access. On this platform, you can find a course on about any subject, and that is no exaggeration – from a tutorial on how to ride a motorcycle, to managing the financial markets. The language and the course format are established by the teacher. This is why it is important to read the information about the course carefully before parting with any money.
Rating
3.8
(1070)
(585)
(238)
(77)
(86)
Comments (2052)
Like any other website, konevy uses «cookies». These cookies are used to store information including visitor's preferences, and the pages on the website that the visitor accessed or visited. The information is used to optimize the users' experience by customizing our web page content based on visitors' browser type and/or other information. For more general information on cookies, please read the «What Are Cookies» article on Cookie Consent website.