Skip to main content

Hacking was never so easy!

Professional Hacking was never so easy! redpill Hacker version 4 has been released - easier to use and more powerful!

New Enhancements in redpill Hacker 4:

The new version of redpill Hacker has more features but is easier to use!

Creating Payloads Made Easy with redpill Hacker 4 - Click to Enlarge
When making selections, detailed descriptions of each item selected are added to help you understand what will be created and how it works (see screenshot above - click to enlarge).

With redpill Hacker you could always have created many different payloads (covert install modules that secretly install spy programs on the target computer) and each one could be customized. Now, in version 4, you can also choose from different types of payloads performing different tasks with different levels of sophistication.

There are lightweight payloads that bypass the Windows UAC Warning message. Then there are also heavyweight payloads that perform a lot more tasks and return a lot more data that require a bit more social engineering. Even installing heavyweight payloads that require sophisticated social engineering is easy as redpill Hacker 4 comes with new and more advanced Social Engineering Templates:

Social Engineering Template in redpill Hacker 4
Attacking a target (hacking the target - installing a spy program remotely on the target computer) is also easier (and more fun!) in redpill Hacker 4:


As with previous versions you can choose to attack (install spy program) on a single target or install on multiple (unlimited) targets with the click of a button. In version 4 a section has been added to give you a detailed description of what you have selected to make sure you choose the correct social engineering template and payload for the job.

Other enhancements in version 4 include:

  • Payloads (spy install modules) are more difficult to detect.
  • New Document Grabber payload type that will secretly retrieve documents from the target computer.
  • New Fly-By payload will secretly take screenshots for a day. Will not start again after a computer restart like the full payload (that runs indefinitely, takes screenshots and log all keys), but as a lightweight payload it is more difficult to detect and will have a higher success rate.
  • General improvements to the redpill Hacker interface was made.
  • redpill Hacker 4 is more user friendly - easier to understand.
For more information about redpill Hacker go to the redpill website: http://www.redpill.co.za

Comments

Popular posts from this blog

How to remotely install spy software

---------------------------------------------------------------------------------------------- Update (2015/07/07):  redpill now has a new and better product for installing spy software remotely: redpill Hacker
You can also have a look at newer articles with better tools at:
http://spysoftware.redpill.co.za -----------------------------------------------------------------------------------------------
In a previous article we discussed how to get usernames and passwords from other users on a computer you have access to. We will now look at how to install spy software on a computer you do not have access to … even if the computer is on the other side of the world.

Step 1: Get quality Spy Software

You will need quality spy software that can be remotely installed and is not easily detected and removed by anti-virus. There are a couple of key loggers that can be installed remotely, but very few that can secretly be remotely installed.

redpill Detective has been designed to be covertly installed…

Sending a spy program with gmail

To install a spy program remotely you need to email the target an install module. Spy software like redpill Agent and redpill Detective allows you to hide the install module within a 'cover application' . When emailing the target the install module, you will need either zip the file, embed it into wordpad or send it as a link as most email service providers doesn't allow you to add executables (exe's) as attachments.

To see how to send the spy program as a link see 'Installing spy software with a link'.
To see how to embed the spy program in wordpad, see  'How to remotely install spy software'.

Using a zipped file for the attachment can be a problem when either you or your target is using gmail as gmail will block attachments that contain executables even when they are zipped.

There is however a simple solution to the problem:

Add a password to your zip file

In winrar and winzip you can choose to add a password to your zip/rar file. When you add a passwo…

How to get a username and password

---------------------------------------------------------------------------------------------- Update (2015/07/07):  redpill now has a new and better product available: redpill Hacker

You can also see more up to date articles at:
http://spysoftware.redpill.co.za
-----------------------------------------------------------------------------------------------
This article will explain how to get a username and password for an email account like gmail or yahoo or a social network account like facebook.

In this article we will focus on getting a username and password of another user (the target) on a computer that you have access to. In a following article we will explain how to get a username and password from someone that works on a computer that you do not have access to that might be in another part of the world.

Step 1: Install a key logger

You will need to download and install a key logger that is not easily detected by anti-virus software and that is completely hidden and discreet
redpil…