Skip to main content

FUD Spy Programs


FUD - no, not 'Fear, Uncertainty and Doubt ' but Fully UnDetectable Spy Software means Key Loggers and other Spy Programs that can get past Anti-Virus systems.

Some hackers use Crypting programs to make spy programs and key loggers undetectable.The crypting programs does not encrypt the program files as that would make them unusable, instead the code within the file is scrambled. The problem with these programs is that although the file might no longer be detected by anti-virus, the file becomes damaged and unusable (the crypting program causes problems within the program file.

redpill have been using a unique set of features and processes to make their spy programs undetectable. With redpill Agent, these features and processes are applied with Ghost Protocol.

redpill has just released Version 2 of Ghost Protocol that has a lot more enhanced features and processes that include:
  • Code Obfuscation and Scrambling (basically what a Crypting program does).
  • String and Resource Encryption
  • Code Fogging (a term coined by redpill) - Actual code is hidden within 'tons' of FOG code (actual code performing actual tasks generated by a redpill in-house program)

The above processes are run daily on the redpill modules. Apart from these processes, redpill has also developed various counter detection measures that include:
  • Using unique file names, folders and keys with EACH installation.
  • Several features to hide or mask the nature and purpose of the program.
  • Some more Counter Detection Measures that cannot be listed as it is trade secrets. 

redpill Agent users will automatically get the new version of Ghost Protocol the next time they activate it or if they purchase a new redpill Agent license.

Please Note: 
No program is really FUD. They might get past an initial scan as they get past the fingerprint scan method (known malware detection) but they can then be detected as the behaviour of the program is suspicious. Some Anti-Virus (depending on the settings) will flag any program as possible malware if it is not known and if it has been downloaded or received via email. redpill strive to get past the most Anti-Virus software and as close to FUD as possible but cannot guarantee that we will get past ALL Anti-Virus all of the time. Please report high detection rates.

Comments

Popular posts from this blog

How to remotely install spy software

---------------------------------------------------------------------------------------------- Update (2015/07/07):  redpill now has a new and better product for installing spy software remotely: redpill Hacker
You can also have a look at newer articles with better tools at:
http://spysoftware.redpill.co.za -----------------------------------------------------------------------------------------------
In a previous article we discussed how to get usernames and passwords from other users on a computer you have access to. We will now look at how to install spy software on a computer you do not have access to … even if the computer is on the other side of the world.

Step 1: Get quality Spy Software

You will need quality spy software that can be remotely installed and is not easily detected and removed by anti-virus. There are a couple of key loggers that can be installed remotely, but very few that can secretly be remotely installed.

redpill Detective has been designed to be covertly installed…

Sending a spy program with gmail

To install a spy program remotely you need to email the target an install module. Spy software like redpill Agent and redpill Detective allows you to hide the install module within a 'cover application' . When emailing the target the install module, you will need either zip the file, embed it into wordpad or send it as a link as most email service providers doesn't allow you to add executables (exe's) as attachments.

To see how to send the spy program as a link see 'Installing spy software with a link'.
To see how to embed the spy program in wordpad, see  'How to remotely install spy software'.

Using a zipped file for the attachment can be a problem when either you or your target is using gmail as gmail will block attachments that contain executables even when they are zipped.

There is however a simple solution to the problem:

Add a password to your zip file

In winrar and winzip you can choose to add a password to your zip/rar file. When you add a passwo…

How to get a username and password

---------------------------------------------------------------------------------------------- Update (2015/07/07):  redpill now has a new and better product available: redpill Hacker

You can also see more up to date articles at:
http://spysoftware.redpill.co.za
-----------------------------------------------------------------------------------------------
This article will explain how to get a username and password for an email account like gmail or yahoo or a social network account like facebook.

In this article we will focus on getting a username and password of another user (the target) on a computer that you have access to. In a following article we will explain how to get a username and password from someone that works on a computer that you do not have access to that might be in another part of the world.

Step 1: Install a key logger

You will need to download and install a key logger that is not easily detected by anti-virus software and that is completely hidden and discreet
redpil…