Skip to main content

Posts

New redpill website

redpill Hacker has a new home. Our new website (www.redpill.co.za) has a cool new look and is also mobile friendly. It was important for us to make our new site mobile friendly as we will be adding training articles to the site. To launch our new site we are offering redpill Hacker at the reduce price of $99 for a limited time (once off payment).

The training articles that we are planning to add will include the following:

How to install key loggers remotely.How to install spy programs via email.Creating websites with payloads (spy software that can be installed secretly and remotely).Creating password phishing websites to capture usernames and password.How to use social engineering to install spy software.SQL Injection, the darknet and many more. This blog also has training articles but we are planning more structured online training on the redpill website.

Recent posts

Why we need hackers and hacktivists

In a perfect world, we could all sit back and just trust that our governments will do the 'right thing'. We can believe that the CIA, FBI, NSA are the good guys and there to help and protect us. We can believe that they are the 'good guys' and they are protecting us from the 'bad guys'. In a perfect world ...

The problem is we do not live in a perfect world. You just need to read the news to see how governments are hacking one another. How the 'good guys' wants more power and control to protect us from the 'bad guys' but how they misuse and abuse their power.

I live in South Africa and on a daily basis we read in the news how top government officials - even, and especially in the police and security sector - are attacking one another and exposing how the others are using their positions for self enrichment through corruption.

We live in the real world where there are no black and white (100% right or 100% wrong), but multiple shades of grey. No…

How Hackers Bypass Mobile Verification

Please Note: The purpose of this article is to inform people of how hackers can steal information and to prevent the illegal and criminal use of Penetration Testing Software like redpill Hacker.


Cyber-criminals can install key loggers on your computer to get your login details. Sites that require a more secure form of log-in will send a verification code to the user's mobile phone (SMS - OTP) to prevent this type of attack. It is mostly banks but also other sites (think of Google's two step verification) that uses this method.

So how do hackers get past the mobile verification step?

Easy - The ask the user what the code is! It is called social engineering and this is how it works:

They get information about you - usually everything they need they can get from your facebook account. All they need to get started is your email and phone number.They then use hacking tools to get your username and password from your computer.They will then give you a call claiming to be from the com…

How to remotely install a spy program

Windows and Internet security came a long way since the good old Windows XP days. Installing spy software silently and remotely back then was easy. All you needed was an easy to use spy program like redpill Agent (no longer available) and you where good to go.

Several things changed from those days that makes installing spy software remotely much more difficult:
User Account Control (UAC) was introduced by Microsoft making silent installs almost impossible.  Using Exploits to install is no longer a viable option as security updates are now much more widely and quickly rolled out. In Windows 10, automatic updates are on by default and can only be turned off for a short period.Advanced Anti-Virus programs no longer just scan for known malware but uses 'Heuristic Analysis' and 'Wisdom of the Crowd'.Email services started applying very strict rules as to what type of attachments can be emailed. Security awareness has drastically increased in the last couple of years.  Nowa…

Payload Websites with redpill Hacker 6

redpill Hacker 6 has just been released with more flexible and powerful payload websites.

A payload website is a website that is created by redpill Hacker that is used to secretly install spy software (the payload) remotely on a target computer.

Example of a Payload website create by redpill Hacker:


In redpill Hacker 5 you could also have created payload websites, but you now have more flexibility to make the website look the way you want it to.

You can use any 'con' - any app that you can think off that people would want to download. You simply choose the wording for your site and select a background.


No website development skills required - redpill Hacker will create the website for you in seconds.


redpill Hacker 6 also comes with a new and improved help file to help you with even more advanced topics including:
Step by step 'getting started' instructions that can turn anyone into a professional hacker. Creating payloads (spy install modules) that can be installed - s…

Hacking tools to get usernames and passwords

redpill Hacker has various tools and methods to get usernames and passwords from a target computer. In this article I will briefly discuss the different methods of retrieving passwords using redpill Hacker.

Payload with Key Logger

redpill Hacker allows you to create a payload that will remotely install a key logger on the target computer. Everything that is typed on the computer will be recorded and secretly emailed to you including usernames and passwords.

Saved keywords will not be retrieved (this action increases the detection rate), instead you can use the 'Retrieve Saved Passwords' template in redpill Hacker.

When you use the 'Retrieve Saved Passwords' Social Engineering Template, redpill Hacker will do the following:

It will create a payload that looks like a Virus Removal Tool.redpill Hacker will then email the target the payload and explain that there is a virus that steal passwords doing the rounds.It will then instruct the target to temporarily disable his Anti …

Hack in secret with the Darknet

If you think it is only a couple of terrorists that is being watched by the authorities, think again. 

Have a look at the google transparency report (click this link) . Google and other companies comply with thousands or requests for information about specific user accounts from authorities all over the world!

 In 2015 there where 68 908 requests where they provided data to authorities … with other words give access to the gmail accounts. These stats are from google themselves! You will also notice when you look at the graph that the number of requests per year is growing. Keep in mind, that this is just gmail. All other email providers receive similar requests.

There is of course the 'If you have nothing to hide' argument. In a perfect world that might make some sense. We live in an imperfect world where nothing is truly black or white, where the good guys is never 100% good and the bad guys never (well seldom) 100% bad.

You can't just simply trust that you are only being…