Skip to content

Commit 503d1e3

Browse files
Toolkit ETH -
0 parents  commit 503d1e3

File tree

4 files changed

+470
-0
lines changed

4 files changed

+470
-0
lines changed

.idea/.gitignore

Lines changed: 8 additions & 0 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

README.md

Lines changed: 129 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,129 @@
1+
# Windows 10 Security Assessment Tool
2+
3+
![Security](https://img.shields.io/badge/Purpose-Security_Testing-red)
4+
![Python](https://img.shields.io/badge/Language-Python-blue)
5+
![License](https://img.shields.io/badge/License-MIT-green)
6+
7+
⚠️ **Legal Disclaimer**: This tool is for **educational purposes and authorized penetration testing only**. Unauthorized use against systems you don't own is illegal. The developer assumes no liability for misuse.
8+
9+
## 🔍 Features
10+
- System Information Collection
11+
- Screenshot Capture
12+
- Webcam Access
13+
- Keylogging
14+
- Geolocation Tracking
15+
- Automated EXE Builder
16+
- Gmail Reporting System
17+
18+
19+
20+
## 🔍 Deep Dive: Features
21+
1. System Intelligence Gathering
22+
- Harvests network configurations, installed software, and hardware specs
23+
24+
- Maps user privileges and system vulnerabilities
25+
26+
- Exports data in structured reports
27+
28+
2. Surveillance Modules
29+
- Stealth Screenshot Capture: Operates silently with random intervals
30+
31+
- Webcam Access: Single-frame capture without LED activation (on some devices)
32+
33+
- Keylogging: Logs keystrokes with timestamp metadata
34+
35+
3. Operational Security
36+
No Persistent Installation: Leaves minimal forensic traces
37+
38+
- Gmail Exfiltration: Uses TLS-encrypted SMTP for secure data transfer
39+
40+
- Dynamic Sleep Intervals: Avoids pattern-based detection
41+
42+
43+
44+
45+
## 🛠️ Deployment Scenarios
46+
1. Security Research Labs
47+
- Test malware detection evasion techniques
48+
49+
- Benchmark antivirus response times
50+
51+
2. Corporate Penetration Tests
52+
- Demonstrate phishing risks
53+
54+
- Highlight data exfiltration vectors
55+
56+
3. Educational Environments
57+
- Teach intrusion detection methods
58+
59+
- Analyze attack telemetry
60+
61+
62+
63+
64+
65+
66+
## ⚠️ Critical Ethical Guidelines
67+
- Legal Compliance
68+
- Always obtain written authorization before testing
69+
70+
- Never deploy on systems you don’t own/control
71+
72+
- Adhere to GDPR/HIPAA regulations when handling data
73+
74+
- Responsible Disclosure
75+
- Report vulnerabilities to system owners immediately
76+
77+
- Never retain collected data beyond testing periods
78+
79+
- Detection Risks
80+
- Enterprise EDR solutions may flag certain activities
81+
82+
- Network monitoring can detect SMTP exfiltration
83+
84+
- Physical webcam LEDs may activate on some models
85+
86+
87+
88+
## 🌐 Community & Support
89+
- Contributing
90+
- We welcome responsible security researchers to:
91+
92+
- Submit vulnerability reports
93+
94+
- Suggest detection avoidance improvements
95+
96+
- Translate documentation
97+
98+
- Support Channels
99+
- GitHub Issues: For technical problems
100+
101+
- Telegram: @Python_Hacking_Tools (for verified researchers)
102+
103+
104+
105+
106+
107+
## 📊 Metrics & Tracking
108+
- Monitor your repository’s impact with:
109+
110+
- GitHub Traffic Analytics (Views/Clones)
111+
112+
- Release Download Counts
113+
114+
- Visitor Badges in README
115+
116+
117+
118+
119+
120+
## 📜 License & Attribution
121+
- This project operates under MIT License. Commercial use requires prior written consent.
122+
123+
- Attribution Requirements:
124+
125+
- Credit original author in derivatives
126+
127+
- Link back to this repository
128+
129+

0 commit comments

Comments
 (0)