Thursday, 22 October 2015

Hacking Made Easy

Hacking made easy with the new redpill Hacker 4!


Video explain hacking principles and show multiple ways of hacking with redpill Hacker.

For more information about redpill Hacker visit http://www.redpill.co.za


Wednesday, 21 October 2015

Hacking was never so easy!

Professional Hacking was never so easy! redpill Hacker version 4 has been released - easier to use and more powerful!

New Enhancements in redpill Hacker 4:

The new version of redpill Hacker has more features but is easier to use!

Creating Payloads Made Easy with redpill Hacker 4 - Click to Enlarge
When making selections, detailed descriptions of each item selected are added to help you understand what will be created and how it works (see screenshot above - click to enlarge).

With redpill Hacker you could always have created many different payloads (covert install modules that secretly install spy programs on the target computer) and each one could be customized. Now, in version 4, you can also choose from different types of payloads performing different tasks with different levels of sophistication.

There are lightweight payloads that bypass the Windows UAC Warning message. Then there are also heavyweight payloads that perform a lot more tasks and return a lot more data that require a bit more social engineering. Even installing heavyweight payloads that require sophisticated social engineering is easy as redpill Hacker 4 comes with new and more advanced Social Engineering Templates:

Social Engineering Template in redpill Hacker 4
Attacking a target (hacking the target - installing a spy program remotely on the target computer) is also easier (and more fun!) in redpill Hacker 4:


As with previous versions you can choose to attack (install spy program) on a single target or install on multiple (unlimited) targets with the click of a button. In version 4 a section has been added to give you a detailed description of what you have selected to make sure you choose the correct social engineering template and payload for the job.

Other enhancements in version 4 include:

  • Payloads (spy install modules) are more difficult to detect.
  • New Document Grabber payload type that will secretly retrieve documents from the target computer.
  • New Fly-By payload will secretly take screenshots for a day. Will not start again after a computer restart like the full payload (that runs indefinitely, takes screenshots and log all keys), but as a lightweight payload it is more difficult to detect and will have a higher success rate.
  • General improvements to the redpill Hacker interface was made.
  • redpill Hacker 4 is more user friendly - easier to understand.
For more information about redpill Hacker go to the redpill website: http://www.redpill.co.za

Wednesday, 14 October 2015

Stealth Document Grabber

Version 3.6 of redpill Hacker has been released. One of the enhancements is a new type of payload (spy module) called the 'Stealth Document Grabber;.

Stealth Document Grabber

Stealth Document Grabber - Click to enlarge

The Stealth Document Grabber will secretly email documents, pictures and other files on the target computer to you. The Stealth Document Grabber is also part of a new group of lightweight payloads.

Lightweight Payloads vs Heavyweight Payloads

There is a new group of Lightweight Payloads that is available in Version 3.6. These payloads only runs once and only perform specific tasks. The advantage of these payloads is that they are more difficult to detect and they bypass the Windows UAC Warning Message.

Heavyweight payloads can perform multiple tasks (key logging, taking screenshots) and will also continue to monitor a computer even after a computer restart was done. When the payload is however run for the first time it will cause the Windows UAC warning message to pop up. However, redpill Hacker has advanced Social Engineering Templates designed to 'convince' the target to allow the payload to run even when the UAC message appears (version 3.6 also has a couple of new social engineering templates).

Both the lightweight and heavyweight payloads has some pros-and-cons. Both heavyweight and lightweight will secretly install the spy program and both has advanced counter anti-virus detection features. The main difference:
  • Lightweight only runs once and performs a specific task (like the document grabber that sends you the documents on the target computer). They bypass the UAC message and is more difficult to detect. They will have a higher success rate.
  • Heavyweights can perform multiple tasks (key logging, taking screenshots) and can monitor a computer indefinitely. They will have a lower success rate but will return more data when they succeed.
redpill Hacker 3.6 is more flexible and gives you the ability to plan your attack better.For more information about redpill Hacker visit the redpill website.

Monday, 12 October 2015

How to use a phishing site to retrieve passwords

redpill Hacker is Penetration Testing Software for ethical hackers with various hacking tools. In this article I will explain how the Password Phishing Website tool works.

Password Phishing Website Tool - Click to enlarge
All you need is a Windows hosting option with a Windows Server that supports ASP.NET 4.0. There are a lot of website hosting companies to choose from like godaddy.com (and countless others) where you can get very inexpensive hosting options.

Your 'con' will be to email the target a link to some 'secure content' that will require him to sign in using his social media account (gmail, yahoo, facebook, etc). The secure content can be any youtube video or any other video from any other site. It could also be a link to a PDF or some other content on the Internet.

Below is a break down of how it works:


  1. You specify the custom settings you want in redpill Hacker and redpill Hacker creates the phishing site for you to fit into your specific con.
  2. redpill Hacker sends an email to the target using the Social Engineering Template you selected. The Templates are designed to convince the target to click on the link.
  3. The target clicks on the link to view the video (or other content you selected). He is redirected to the phishing site where he is required to login using his social media account.
  4. After he signed in he is redirected to the video or other content you selected. The redirection is quick so the target will not even realize that he was redirected. He will just think he needed to sign in to watch the video and then will continue to watch the video.
  5. redpill Hacker will then retrieve the target's username and password from the phishing site.''
For a demo of how this works see the video below:


For more information about redpill Hacker or other spy software visit the redpill Website.