Skip to main content

Ghost Protocol Explained

We previously posted an article that explained what Ghost Protocol is and how it works. We however still receive a lot of questions on how it works and when it is needed.

Ghost Protocol is needed to reduce the anti virus detection rate of redpill Agent.

If you think of redpill Agent as a virus, then Ghost Protocol allows you to create a new strain of the virus (redpill Agent). 

It is still the same virus (redpill Agent), just a new strain that is not known and not easily detected. 

When you create new install modules with GP active, a new strain of redpill Agent is created that is not known by anti-virus companies. Once installed, it is possible that over time your specific strain of redpill Agent becomes known and removed by some Anti Virus packages.

If you then simply reinstall with the install modules that you created the previous time you installed, then the installations will immediately be detected and removed. What you need to do is to create new install modules with GP active again, so that you again create a new strain of redpill Agent.

With other words:
  • You can keep on using the install modules you downloaded for as long as you want, but over time they might become less effective as that specific strain of redpill Agent might become known by AV companies.
  • You do not need to keep GP active all the time ... only when you create install modules. When you activate GP it will be active for 20 days (more than enough time to create new install modules).
  • You cannot download new install modules if GP is not active. You can however save the ones you downloaded and use them after the 20 days of GP expired. 
Your redpill Agent license does not expire. If however you want to download a new strain of redpill Agent (Activate Ghost Protocol) after your GP expired, you will need to pay for GP again. 
Ghost Protocol require a lot of continues hard work and the more customers use it, the more work is required to reduce the detection rate ... so it is only fair that you pay a fee if you want to use GP again.

Please Note: Even when you create new install modules with GP active, redpill Agent can still be blocked by some anti-virus companies. Some AV companies (depending on the settings) might block all programs downloaded from the internet or received via email that is not know (any new program). 

For more information about redpill Agent and other spy programs visit


Popular posts from this blog

Sending a spy program with gmail

To install a spy program remotely you need to email the target an install module. Spy software like redpill Agent and redpill Detective allows you to hide the install module within a 'cover application' . When emailing the target the install module, you will need either zip the file, embed it into wordpad or send it as a link as most email service providers doesn't allow you to add executables (exe's) as attachments.

To see how to send the spy program as a link see 'Installing spy software with a link'.
To see how to embed the spy program in wordpad, see  'How to remotely install spy software'.

Using a zipped file for the attachment can be a problem when either you or your target is using gmail as gmail will block attachments that contain executables even when they are zipped.

There is however a simple solution to the problem:

Add a password to your zip file

In winrar and winzip you can choose to add a password to your zip/rar file. When you add a passwo…

How to remotely install spy software

---------------------------------------------------------------------------------------------- Update (2015/07/07):  redpill now has a new and better product for installing spy software remotely: redpill Hacker
You can also have a look at newer articles with better tools at: -----------------------------------------------------------------------------------------------
In a previous article we discussed how to get usernames and passwords from other users on a computer you have access to. We will now look at how to install spy software on a computer you do not have access to … even if the computer is on the other side of the world.

Step 1: Get quality Spy Software

You will need quality spy software that can be remotely installed and is not easily detected and removed by anti-virus. There are a couple of key loggers that can be installed remotely, but very few that can secretly be remotely installed.

redpill Detective has been designed to be covertly installed…

How to get a username and password

---------------------------------------------------------------------------------------------- Update (2015/07/07):  redpill now has a new and better product available: redpill Hacker

You can also see more up to date articles at:
This article will explain how to get a username and password for an email account like gmail or yahoo or a social network account like facebook.

In this article we will focus on getting a username and password of another user (the target) on a computer that you have access to. In a following article we will explain how to get a username and password from someone that works on a computer that you do not have access to that might be in another part of the world.

Step 1: Install a key logger

You will need to download and install a key logger that is not easily detected by anti-virus software and that is completely hidden and discreet