Skip to content

Latest commit

 

History

History
41 lines (28 loc) · 1.69 KB

README.md

File metadata and controls

41 lines (28 loc) · 1.69 KB

Screen Recorder

    Someone from Maharashtra mistakenly / intentionally 
    downloaded and run my key_logger.exe, and I got secrets.

image

  • Hacking Screen and Microphone.
  • Mailed or Upload on Drive the recorded video to me.

image

Convert any python file into exe.

pip install pyinstaller
pyinstaller "screen recorder.py" --onefile
cd dist
"screen recorder.exe"

pyinstaller --onefile --noconsole "audio recorder mail.py"

File Upload

image

Why do I need to ignore files in .gitignore?

  • The files contain sensitive data.

  • Security and API keys/secrets

      For security, the security key files and
      API keys should get added to the gitignore.
      (That is, if they’re even stored in the directory).
    
      Every commit is recorded in the history of a GitHub repo.
      If a key is submitted,
      even if it is taken down immediately after,
      a record of the key exists in that commit.