Skip to main content


Showing posts from 2013

Sending a spy program with gmail

To install a spy program remotely you need to email the target an install module. Spy software like redpill Agent and redpill Detective allows you to hide the install module within a 'cover application' . When emailing the target the install module, you will need either zip the file, embed it into wordpad or send it as a link as most email service providers doesn't allow you to add executables (exe's) as attachments.

To see how to send the spy program as a link see 'Installing spy software with a link'.
To see how to embed the spy program in wordpad, see  'How to remotely install spy software'.

Using a zipped file for the attachment can be a problem when either you or your target is using gmail as gmail will block attachments that contain executables even when they are zipped.

There is however a simple solution to the problem:

Add a password to your zip file

In winrar and winzip you can choose to add a password to your zip/rar file. When you add a passwo…

Spy Software for Windows 8

redpill has tested the following spy applications on Windows 8:

redpill Spy Light - The FREE spy programredpill Spy BASICredpill Spy PRO - Tests included remote monitoring.redpill Detective - Tests included remote installation and remote monitoring.redpill Agent - Tests included remote installation and remote monitoring. All the redpill Spy programs passed the Windows 8 test.
redpill is also continually busy updating their software to avoid detection by most anti-virus packages.

What spy program to use to monitor multiple computers remotely

redpill has three spy programs that can monitor a computer remotely. Two of these spy products, redpill Agent and redpill Detective, allow you to install remotely and to monitor multiple computers.

redpill Detective has been designed so that you can monitor multiple computers from your account (control panel) but you need to purchase a license for each computer. For that reason, a lot of redpill customers prefer redpill Agent as you can monitor multiple computers with one license.

How many computers can redpill Agent monitor?

There is no set limit, but it is also not unlimited … let me explain …

Unlike redpill Detective where you view the data in your redpill account, redpill Agent will email you the data to your gmail email address. redpill Agent will also use your account to send the data (to yourself). Gmail has a limit of 500 emails per day. So at some point it will not be logical to add more computers to your account.

The number of emails each computer will send will depend on how…

redpill Agent beats Norton and Yahoo mail

If you are familiar with spy software you will know that there is a non stop battle going on between spy software vendors like redpill and anti-virus companies like Norton. As anti-virus companies finds new ways to detect spy programs, companies like redpill finds new ways to stay undetected.

There are two ways to install redpill Agent remotely via email:
By sending the target a linkBy attaching the install module to the email (either as a zipped file or embedded into wordpad) Recently, Yahoo started using Norton to scan their attachments and redpill Agent was detected if the second method where used even when embedded into a wordpad file.
On 2013/08/03 redpill released a new version of redpill Agent that gets past the Norton scan of Yahoo if Ghost Protocol is active. It is now again possible to use the second method of installing when sending an email from or two a Yahoo email address.
redpill Agent will also now again get past most anti-virus scans.
Please note: No remote installatio…

Installing a spy program using Yahoo

Update: On 2013/08/03 redpill released an update to redpill Agent that allows redpill Agent to again get past the Norton scan of Yahoo if Ghost Protocol is active. Yahoo recently started using Norton to filter email attachments. Currently redpill Detective does not get detected by Norton but redpill Agent from time to time does get detected by Norton. redpill continually work to avoid detection, but in the same way anti virus companies also keep on working on new methods to detect spy software.

If you try to attach the install module (embedded in a wordpad document) to a Yahoo email and it fails, you can email it using another service like gmail. If however you want to email it from or to a Yahoo email address, you need to send it as a link.

How to email the redpill Agent install module as a link

First we are going to create our install module. For this test, we are not going to use one of the default cover install modules but create our own … a ‘SMART Virus Removal Tool’.

Ensure that

Liberty Reserve – Alternative Payment Options

As most of you know, the Liberty Reserve website has been seized by US authorities.

You can read the full story here:  Liberty Reserve Shutdown- What Now?

As Liberty Reserve was one of the payment options for redpill, we would like to make our Liberty Reserve customers aware of other payment options that redpill support.

For most of our spy software products we offer a wide range of payment options including credit card and paypal. To use these options just select the Avangate payment option on the redpill purchase page. We also support online currencies (webmoney and Perfect Money).

One of our spy programs, redpill Agent is not available through Avangate. To purchase redpill Agent or Ghost Protocol please use one of following payment options:
Webmoney – go to to create an accountPerfect Money - can be funded with Western Union and MoneyGram. Go to to create an account.Local Bank Transfer or cash deposit in South Africa. International Wire Transf…

Ghost Protocol

redpill Agent now with Ghost Protocol!!

What is Ghost Protocol?

Ghost Protocol is not a new spy program or a different version of redpill Agent. When Ghost Protocol is activated, a specific protocol (set of rules and procedures) is used to create the install module of redpill Agent that greatly reduces the risk of detection and removal by anti-virus software.

Why is Ghost Protocol needed?

Initially the idea of redpill Agent was for an ethical hacker, private detective or the victim of infidelity, to do targeted installations on remote computers of specific targets.

The problem is that some cyber criminals use redpill Agent to install on random computers in a phishing type approach. This exponentially increased the number of installations of redpill Agent.

The more installations of a spy program there is, the easier it is for anti-virus companies to detect and remove the spy program.

Ghost Protocol takes care of this problem.

How Ghost Protocol works

A redpill Agent customer can at any ti…

Installing Spy Software with a link

We previously posted a similar article on how to install spy software (key logger) with a link. In that article we explained that you need to set up a website for this. Thanks to Google Drive, this is no longer needed. Installing a spy program with a link is now much easier.

How to install spy software using Google Drive:

Step 1: Create a gmail account.

When you create a gmail account you will automatically get a Google Drive account as well.

Step 2: Get a redpill Detective account from redpill

Go to to find out more about redpill Detective. Make sure you only purchase from redpill ( as there are some fake websites selling redpill Detective.

Step 3: Embed the install module into a WordPad file.

Log into your  redpill Detective account and download your install module. Embed the install module into a WordPad file.

You can simply drag and drop the install module into the wordpad file. The file needs to have an rtf extension. You can also add some text…

How to remotely install spy software

---------------------------------------------------------------------------------------------- Update (2015/07/07):  redpill now has a new and better product for installing spy software remotely: redpill Hacker
You can also have a look at newer articles with better tools at: -----------------------------------------------------------------------------------------------
In a previous article we discussed how to get usernames and passwords from other users on a computer you have access to. We will now look at how to install spy software on a computer you do not have access to … even if the computer is on the other side of the world.

Step 1: Get quality Spy Software

You will need quality spy software that can be remotely installed and is not easily detected and removed by anti-virus. There are a couple of key loggers that can be installed remotely, but very few that can secretly be remotely installed.

redpill Detective has been designed to be covertly installed…

How to get a username and password

---------------------------------------------------------------------------------------------- Update (2015/07/07):  redpill now has a new and better product available: redpill Hacker

You can also see more up to date articles at:
This article will explain how to get a username and password for an email account like gmail or yahoo or a social network account like facebook.

In this article we will focus on getting a username and password of another user (the target) on a computer that you have access to. In a following article we will explain how to get a username and password from someone that works on a computer that you do not have access to that might be in another part of the world.

Step 1: Install a key logger

You will need to download and install a key logger that is not easily detected by anti-virus software and that is completely hidden and discreet

How does keyloggers get past anti-virus?

Most spy programs gets detected and removed by anti-virus software and security tools. redpill is one of the few (if not the only) spy software company that is continually managing to stay under the radar.

How do the redpill Spy Software Products manage to get past anti-virus packages?

First, let’s look at how anti-virus packages detect spy software and key loggers.

There are two main ways how anti-virus packages detect malware and spy software:

Fingerprint Detection:
Anti-virus companies have databases of know malware and spy software that is updated daily (virus definition files). The anti-virus software then looks for a fingerprint … a piece of code that would be unique to the specific spy program inside each file.

Behavior Detection:
Each anti-virus package has its own name for this technique (Bloodhound, Sonar Detection, Sandbox Testing, etc). In short, the software will not only look at what the program is doing, but also execute pieces of code of the program in a safe (sandbox) e…

Are spy software and key loggers legal?

Is spy software like redpill Spy legal?
YES! The software itself is not illegal. It is however possible to use the software in an illegal manner.
In most countries it would be illegal to install spy software on a computer you do not own. In some countries you would also be required to inform your employees if you are going to monitor their computers. There are obviously exceptions to these rules and would depend on the specifics of the case.
Examples of where it would (normally) be legal: If you want to monitor your employees working on your computers.If you want to monitor your children to protect them from the dangers of the internet. If you install it on you home computer even if you are not the only one using the computer.If you are doing official penetration testing for a company.
Examples where it would usually be illegal: It would be illegal if you install spy software at an internet café with the purpose of stealing credit card or other personal information.If you remotely instal…