Skip to main content

Posts

Showing posts from October, 2015

Hacking Made Easy

Hacking made easy with the new redpill Hacker 4!

Video explain hacking principles and show multiple ways of hacking with redpill Hacker.

For more information about redpill Hacker visit http://www.redpill.co.za


Hacking was never so easy!

Professional Hacking was never so easy! redpill Hacker version 4 has been released - easier to use and more powerful!

New Enhancements in redpill Hacker 4:

The new version of redpill Hacker has more features but is easier to use!

When making selections, detailed descriptions of each item selected are added to help you understand what will be created and how it works (see screenshot above - click to enlarge).

With redpill Hacker you could always have created many different payloads (covert install modules that secretly install spy programs on the target computer) and each one could be customized. Now, in version 4, you can also choose from different types of payloads performing different tasks with different levels of sophistication.

There are lightweight payloads that bypass the Windows UAC Warning message. Then there are also heavyweight payloads that perform a lot more tasks and return a lot more data that require a bit more social engineering. Even installing heavyweight payloads tha…

Stealth Document Grabber

Version 3.6 of redpill Hacker has been released. One of the enhancements is a new type of payload (spy module) called the 'Stealth Document Grabber;.

Stealth Document Grabber

The Stealth Document Grabber will secretly email documents, pictures and other files on the target computer to you. The Stealth Document Grabber is also part of a new group of lightweight payloads.

Lightweight Payloads vs Heavyweight Payloads

There is a new group of Lightweight Payloads that is available in Version 3.6. These payloads only runs once and only perform specific tasks. The advantage of these payloads is that they are more difficult to detect and they bypass the Windows UAC Warning Message.

Heavyweight payloads can perform multiple tasks (key logging, taking screenshots) and will also continue to monitor a computer even after a computer restart was done. When the payload is however run for the first time it will cause the Windows UAC warning message to pop up. However, redpill Hacker has advanced So…

How to use a phishing site to retrieve passwords

redpill Hacker is Penetration Testing Software for ethical hackers with various hacking tools. In this article I will explain how the Password Phishing Website tool works.

All you need is a Windows hosting option with a Windows Server that supports ASP.NET 4.0. There are a lot of website hosting companies to choose from like godaddy.com (and countless others) where you can get very inexpensive hosting options.

Your 'con' will be to email the target a link to some 'secure content' that will require him to sign in using his social media account (gmail, yahoo, facebook, etc). The secure content can be any youtube video or any other video from any other site. It could also be a link to a PDF or some other content on the Internet.

Below is a break down of how it works:


You specify the custom settings you want in redpill Hacker and redpill Hacker creates the phishing site for you to fit into your specific con.redpill Hacker sends an email to the target using the Social Engine…