Keylogger
Installing a separate keylogger which emails the results can be a good idea (depending on context and chosen strategy). For example, when hacking the target itself is not of interest, but passwords are, using just a keylogger like Zlogger can save a lot of time and effort.
Attack tree
1 Create keylogger
1.1 Standalone (for example Zlogger)
1.1.1 Set parameters and generate
1.1.2 Create gmail account with app password (in Security section)
1.2 Metasploit
1.3 Powershell
2 Copy file to /var/www/html/evil-files (or other server location)
Notes
Remove ZLogger:
Start -> regedit ->
Computer\HKEY_CURRENT_USER\Software\Microsoft\Windows\Current\Version\Run
=> Right click => Modify (copy path to actual executable), then delete the<keylogger name>
entry.In task manager end the associated task
In file manager paste the just copied path and delete the executable.