Skip to main content

How to get a username and password

Update (2015/07/07): 
redpill now has a new and better product available:
redpill Hacker

You can also see more up to date articles at:


This article will explain how to get a username and password for an email account like gmail or yahoo or a social network account like facebook.

In this article we will focus on getting a username and password of another user (the target) on a computer that you have access to. In a following article we will explain how to get a username and password from someone that works on a computer that you do not have access to that might be in another part of the world.

Step 1: Install a key logger

You will need to download and install a key logger that is not easily detected by anti-virus software and that is completely hidden and discreet
redpill Spy is a good choice as it is free, does not expire, is completely hidden and discreet and has the best record for staying undetected by anti virus software.

You can download redpill Spy from the redpill website (click on downloads).

After you installed the key logger, follow the instructions on how to open it and change the default password to open it.

Step 2: Wait for the target to log in.

You then need to wait for the target to log into his/her email account and/or social network account. Even if the user works on another Windows account on the computer everything he or she does will still be recorded.

Step 3: Get the username and password

After the user worked on the computer and when you have some time alone at the computer, open redpill Spy. Select the user account that the target used and click on the Key Log tab.

It will be easy to see the username and password. For a facebook username and password just look for the Window Title that says 'facebook log in'. The username and password will be in the text below (click on the image above to enlarge it).

Note that if the user used TAB to go from the username to the password, the username and password will be separated by [TAB]. If the user used his/her mouse, then the username and password will be combined but it should still be easy to see where the username ends and the password begins.


  1. Are you sure that it will work well? For me it is very important cuz I would like to use it in future for sure. And how do you think, will it possible to keep an eye on correspondence in this service with the help of the program on the similarity of this Interesting to know.



      Are You Seeking For A LEGIT PROFESSIONAL HACKER Who Will Get Your Job Done Efficiently With Swift Response?? CONGRATULATIONS, Your Search Ends Right Here.

      • We are a Team Of Professional HACKERS , a product of the coming together of Legit Hackers from the Dark-Web (pentaguard, CyberBerkut, White Hack and Black Hat,) we have been existing for over years, our system is a very strong and decentralized command structure that operates on ideas and directives.

      Whenever We Are been hired as a Team Hackers We typically only take jobs that We find somehow original, challenging, or especially helpful to the community. We’ve never wanted to sit around defending some video game company’s source code from network intruders – We prefer to help nonprofits, private investigators, Private Individuals, government contractors, and other traditionally underserved populations. 
      And We’d rather match skills against the best in the field of state-sponsored hackers engaged in economic espionage than put some kid in prison for pranking the phone company. When a company tries to hire Us, the first question I ask is: “Who is this going to help?”
      I know COMPOSITE HACKS is Well known for LEGIT HACKING SERVICES, but i always try to avoid people thinking We’r proud or making Many individual think its only the big companies that can hire Us, fine, here is Our mail: “””””” You Can Reach Out To Us for Your Desired HACKING Services Ranging from:
      * Penetration Testing
      * Jail Breaking
      * PHONE HACKING (Which gives you Unnoticeable Access to Everything that is Happening on the phone such as call logs, messages, chats and all social media Apps .
      * Retrieval Of Lost Files
      * Location Tracking.
      * Clearing Of Criminal Records.
      * Hacking Of Server, Database And Social Media accounts e.g Facebook, twitter, Instagram Snapchat etc

      * Bank Accounts Loading ( Only USA Banks)
      * Credit Cards Loading (Only USA CC’s)’

      ★Our Team houses a separate group of specialists who are productively focussed and established authorities in different platforms. They hail from a proven track record Called “HackerOne” and have cracked even the toughest of barriers to intrude and capture or recapture all relevant data needed by our Clients. Some Of These Specialist Includes PETER YAWORSKI, FRANS ROSEN, JACK CABLE, JOBERT ABMA, ARNE SWINNEN And More

      ★COMPOSITE HACKS is available for customer care 24/7, all day and night. We understand that your request might be urgent, so we have a separate team of allocated hackers who interact with our Clients round the clock. You are with the right people so just get started.

      * Email:
      * Wickr: compositehacks


  2. I know great software for android which helps you to spy any text messages you need from your girlfriend or wife try to, I like it and can't live without it.

    1. For solution to ALL your spy and hack needs; find ( online via your URL box for help out. They offer the best service as regards cheating partner cases, password recovery and retrieval, need help spy and track on anyone etc and lots more. They are the best and services rendered is 100% guaranteed.

  3. How can you see our children constantly texting messages on the phone? Yes, We aren 'wrong to know what kind of conversation happens between them. - it's best to use spy app software to track their activities.

  4. I use a tracking app from Copy9 to hack facebook. I don't try to track group chats, but I think it should work.

  5. Nice app. Whatever you look you shouldn't download app from untrusted sources. You may even make order for yourself or for commercial. And if you want to have the best result you should find properly company like Nix Solutions . Which take cover of this are as on of the best company

  6. Nice article with useful tips! I also want to recommend you one thing. If you don't know how to write a nice essay, you have definitely use essay writing service. Recently I've used this one and I got a nice essay just in several days.


Post a Comment

Popular posts from this blog

Sending a spy program with gmail

To install a spy program remotely you need to email the target an install module. Spy software like redpill Agent and redpill Detective allows you to hide the install module within a 'cover application' . When emailing the target the install module, you will need either zip the file, embed it into wordpad or send it as a link as most email service providers doesn't allow you to add executables (exe's) as attachments.

To see how to send the spy program as a link see 'Installing spy software with a link'.
To see how to embed the spy program in wordpad, see  'How to remotely install spy software'.

Using a zipped file for the attachment can be a problem when either you or your target is using gmail as gmail will block attachments that contain executables even when they are zipped.

There is however a simple solution to the problem:

Add a password to your zip file

In winrar and winzip you can choose to add a password to your zip/rar file. When you add a passwo…

How to remotely install spy software

---------------------------------------------------------------------------------------------- Update (2015/07/07):  redpill now has a new and better product for installing spy software remotely: redpill Hacker
You can also have a look at newer articles with better tools at: -----------------------------------------------------------------------------------------------
In a previous article we discussed how to get usernames and passwords from other users on a computer you have access to. We will now look at how to install spy software on a computer you do not have access to … even if the computer is on the other side of the world.

Step 1: Get quality Spy Software

You will need quality spy software that can be remotely installed and is not easily detected and removed by anti-virus. There are a couple of key loggers that can be installed remotely, but very few that can secretly be remotely installed.

redpill Detective has been designed to be covertly installed…