Monday, 5 December 2016

December 2016 Special - redpill Hacker for 99$



The $99 special is back - but only for the month of December!

The price for redpill Hacker has again been reduced from $149 to $99 - you save $50!!

redpill Hacker is advanced hacking software that includes key loggers, payload and phishing website generators and more. You can install on unlimited computers and it is a once off payment (license does not expire).

New to hacking and key loggers? Not a problem - redpill Hacker comes with a 40 page manual to get you hacking like a pro in no time.

For more information about this spy program see www.redpill.co.za



Monday, 17 October 2016

How to remotely install a spy program


Windows and Internet security came a long way since the good old Windows XP days. Installing spy software silently and remotely back then was easy. All you needed was an easy to use spy program like redpill Agent (no longer available) and you where good to go.

Several things changed from those days that makes installing spy software remotely much more difficult:
  • User Account Control (UAC) was introduced by Microsoft making silent installs almost impossible.  
  • Using Exploits to install is no longer a viable option as security updates are now much more widely and quickly rolled out. In Windows 10, automatic updates are on by default and can only be turned off for a short period.
  • Advanced Anti-Virus programs no longer just scan for known malware but uses 'Heuristic Analysis' and 'Wisdom of the Crowd'.
  • Email services started applying very strict rules as to what type of attachments can be emailed. 
  • Security awareness has drastically increased in the last couple of years. 
Nowadays, installing spy software require a lot of skill and technical know how ... unless you have redpill Hacker! redpill Hacker is a new generation hacking tool that has been designed to make hacking easy, even if you are not a professional. It bypass the issues mentioned above in the following ways:
  • Lightweight payloads (spy programs) are used to bypass the UAC security.
  • Heavyweight payloads that includes key loggers are installed using advanced Social Engineering templates. These templates are designed to convince the target to run the payload.
  • Several techniques unique to redpill Hacker are used to reduce detection rates of anti-virus packages. Each customer also gets a unique edition (special build) to make sure your payloads (spy programs and key loggers) are not known by Anti-Virus companies.
  • Instead of trying to do a silent install, redpill Hacker uses a Trojan Horse approach where the target thinks the program does something else while the spy program is secretly installed in the background. 
  • Various attachment types are supported to allow you to email using even strict email servers like gmail. 
  • redpill Hacker also includes other tools where no spy software is installed but usernames and passwords are retrieved over the Internet (See Password Phishing Website).
  • Even with no website development skills, redpill Hacker allows you to create custom payload websites where payloads (spy programs) are being installed from a web page. 
As part of the package, you also get a 30 page training manual. The manual is designed to help you get started but also help you move on to more advanced topics like using payload websites to install spy programs. 

For more information visit: http://www.redpill.co.za

Tuesday, 20 September 2016

Payload Websites with redpill Hacker 6

redpill Hacker 6 has just been released with more flexible and powerful payload websites.

A payload website is a website that is created by redpill Hacker that is used to secretly install spy software (the payload) remotely on a target computer.

Example of a Payload website create by redpill Hacker:


In redpill Hacker 5 you could also have created payload websites, but you now have more flexibility to make the website look the way you want it to.

You can use any 'con' - any app that you can think off that people would want to download. You simply choose the wording for your site and select a background.


No website development skills required - redpill Hacker will create the website for you in seconds.


redpill Hacker 6 also comes with a new and improved help file to help you with even more advanced topics including:
  • Step by step 'getting started' instructions that can turn anyone into a professional hacker. 
  • Creating payloads (spy install modules) that can be installed - secretly and remotely.
  • Different types of payloads and how to use them - including key loggers and modules that secretly retrieve documents. 
  • Using Social Engineering Templates to remotely install spy software. 
  • Emailing payloads directly to targets or using redpill Hacker to send the payload. 
  • Sending bulk emails to a list of targets. 
  • Creating Password Phishing Websites - to get user names and passwords.
  • Creating Payload Websites used to install spy software via a website. 
For more information about redpill Hacker visit www.redpill.co.za

Sunday, 7 August 2016

Hacking tools to get usernames and passwords



redpill Hacker has various tools and methods to get usernames and passwords from a target computer. In this article I will briefly discuss the different methods of retrieving passwords using redpill Hacker.

Payload with Key Logger

redpill Hacker allows you to create a payload that will remotely install a key logger on the target computer. Everything that is typed on the computer will be recorded and secretly emailed to you including usernames and passwords.

Saved keywords will not be retrieved (this action increases the detection rate), instead you can use the 'Retrieve Saved Passwords' template in redpill Hacker.

When you use the 'Retrieve Saved Passwords' Social Engineering Template, redpill Hacker will do the following:

  1. It will create a payload that looks like a Virus Removal Tool.
  2. redpill Hacker will then email the target the payload and explain that there is a virus that steal passwords doing the rounds.
  3. It will then instruct the target to temporarily disable his Anti Virus as normal Anti Virus does not detect the virus and it needs to be disabled to allow the virus tool to scan and remove the virus.
  4. The tool will then run - it will loot to the target like a virus is being removed - but the key logger will secretly be installed.
  5. The target will then be instructed to change all his passwords as the virus was found and his passwords was possibly already compromised. 
  6. As the target change each of his passwords, the key logger will email you the website or application used and the new username and password.


Password Phishing Website

The Password Phishing Website is a tool in redpill Hacker that creates a type of portal website that retrieve the target's username and password before redirecting him to the website he intended to go to. This tool has a very high success rate as nothing is installed (no warnings or problems with anti virus) and it works on all devices.

For more information on how this works read: Password Phishing Website in redpill Hacker

Document Grabber

redpill Hacker has a document grabber payload. It is a lightweight payload - that means it gets past 95% of anti-virus and does not cause a UAC warning message to pop up.

The thing that makes a lightweight difficult to detect and stop is the fact that it is ... well, lightweight. It goes in with one single task, performs the task and then disappears. It does not try to install itself in order to keep on running or do anything else.

The task that the document grabber performs is to retrieve all the documents in the Documents folder and all the sub folders.

What does that have to do with passwords? You will be amazed to find out how many computer users have a document in their Documents folder or one of the sub folders with a list of all their usernames and passwords in case they forget them.

To find out more about redpill Hacker go to www.redpill.co.za

Thursday, 7 July 2016

Hack in secret with the Darknet


If you think it is only a couple of terrorists that is being watched by the authorities, think again. 

Have a look at the google transparency report (click this link) . Google and other companies comply with thousands or requests for information about specific user accounts from authorities all over the world!

 In 2015 there where 68 908 requests where they provided data to authorities … with other words give access to the gmail accounts. These stats are from google themselves! You will also notice when you look at the graph that the number of requests per year is growing. Keep in mind, that this is just gmail. All other email providers receive similar requests.

There is of course the 'If you have nothing to hide' argument. In a perfect world that might make some sense. We live in an imperfect world where nothing is truly black or white, where the good guys is never 100% good and the bad guys never (well seldom) 100% bad.

You can't just simply trust that you are only being watched by the 'good guys' and that every employee working at the 'good guys' will never use the information they can get for malicious purposes.
"Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say" - Edward Snowden
redpill do not encourage or condone any illegal activity. Do not use your hacking and spy software legally - respect other people's privacy - but also fight for your own privacy!

What can you do to protect your privacy?

Encrypt your emails using PGP.

You don't need to encrypt all your emails, but if there are some correspondence that you think needs to stay private, you can encrypt your emails. An easy way to do this is to use gmail with mailvelope. See the video below:


Use the Darknet

To be anonymous and to hide your IP address, you can work on the Darknet. With the Internet one computer connects to another computer and it is easy to get the IP address of the original computer.
On the darknet, internet requests are bumped around on computers (or nodes) in a way that it is not possible to get the original IP Address.

You use the darknet with special software like Tor.

How Tor Works:


Tor uses a network of computers to let your encrypted internet request jump around several computers. There is no way for the authorities to check who visited the website.

To use Tor is easy, just install it and use Tor instead of your normal browser. You can still use your normal browser for activities that you feel you don't need to keep private. 

Tor is free and can be downloaded at: https://www.torproject.org


Friday, 20 May 2016

Know your redpill Hacker Payloads

redpill Hacker Payloads

What is a payload?

In computer security, payload refers to the part of malware which performs a malicious action. In redpill Hacker, the payload is attached to an email or a website and is delivered to the target PC. The payload will then secretly perform a specific action like installing a key logger or retrieving documents from the target computer.

Different types of payloads in redpill Hacker

There are different payloads in redpill Hacker and new ones being added with each new release. Some will only take screenshots while another will take screenshots and install a key logger. There is also another that will secretly retrieve all the documents from the target computer.

When you select a payload in redpill Hacker the details of the payload will be displayed to help you choose the right payload for the job.

Select Payload in redpill Hacker
Payloads are grouped into two main categories in redpill Hacker:
  1. Heavyweight Payloads - Does a lot. Takes screenshots, installs key logger and continue to run even after a computer is restarted.
  2. Lightweight Payloads - Only performs a specific tasks and only until the computer is restarted. 
Don't underestimate the Lightweight Payloads

Why would you choose a lightweight payload if it only runs until a restart and only performs a specific task? 

Think of lightweight payloads as the special forces of your army. They do less damage but they can get into places where your conventional forces will not be able to reach.

Lightweight payloads has a very low Anti-Virus detection rate and also bypass the Windows UAC Warning Message. With heavyweight payloads there are ways to deal with the UAC message but it requires a bit more social engineering. 

An example of a lightweight payload is the Document Grabber. It will secretly retrieve all the files in the documents folder (and all sub folders). Depending on what your investigation is all about, this might just be what you need. A lot of computer users store a password file on their computer with a list of their accounts with usernames and passwords.

Remember ...

Don't use redpill Hacker illegally. redpill Hacker should only be used for ethical (legal) hacking, penetration testing and security training. 

Monday, 25 April 2016

Hacking Terms you need to know



On the spy software training blog you will come across various 'hacker' terms. Here are some of the important terms you need to know if you are interested in Penetration Testing (Hacking Tools and Spy Software).

Hacker Some believe that hacker means a skilled and enthusiastic programmer and that a 'cracker' is someone that breaks into system. In the sense that we will use hacker, a hacker is a person who uses computers to gain unauthorized access to data.
Penetration Testing Penetration Testing is when a company ask you to try to hack into their system. They sometimes want to do this to see if their system is secure, and if it is not (if you succeed), they want a report on how you managed to get into their system.
White Hat A 'White Hat' is a good hacker doing only ethical hacking. Examples would be to someone working for the authorities or a person doing Penetration Testing for a company.
Black Hat A black hat is a 'bad' hacker. Using his skills for criminal activities with no regard to people's privacy or damage caused.
Grey Hat A Grey Hat is a hacker that is sometimes willing to cross the line and do a bit of illegal hacking if he can morally justify what he is doing (even if it is just to himself).
Hacktivist A person who gains unauthorized access to computer files or networks in order to further social or political ends.
Target The person you want to monitor or the computer with the data you are looking for.
Social Engineering Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. redpill Hacker has various Social Engineering Templates that can be used for different scenarios. 
Con A con is a confidence trick. You trick someone into winning their confidence so that you can get them to divulge information or perform a task like opening an attachment. A con is part of a social engineering attack.
Payload In computer security, payload refers to the part of malware which performs a malicious action. In redpill Hacker, the payload is attached to an email or a website and is delivered to the target PC. The payload will then secretly install the spy software.
Phishing The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers, online.
Spear Phishing Spear Phishing is a more targeted attack. The attacker first spend some time finding information about the target. When the phishing email is then sent to the target, it contains a lot of personal information about the target – giving the target a sense of familiarity and trust.

Wednesday, 13 April 2016

Hacker Training Course


redpill started a training course for redpill Hacker. The course includes:

  • 8 Day Course (8 Lessons) that can be spread over a longer period.
  • 11 Practical Exercises where you 'attack' a real target (your instructor).
  • PDF Document with 30 pages of tips and advanced training topics.
  • Covers a wide range of topics including social engineering, payloads, password phishing, payload websites that install spy software and more.
  • The instructor will connect to your PC to help you with the exercises.
For prices and more information, 
visit the redpill hacker training page.

For more information about redpill Hacker, go to www.redpill.co.za

Tuesday, 12 April 2016

Why we use Bitcoins


Yesterday, Perfect Money decided to block our account (because we are selling Penetration Testing Software - ouch! ... that is like being kicked out of hell because you are too bad! We thought we where the good guys compared to the rest of the crowd using Perfect Money).

So, as of yesterday, redpill will no longer directly accept Perfect Money (you can still use your PM, read on).

Over the more than 10 years we have been in this business, we used (and stopped using) a lot of different payment methods:

  • Liberty Reserve, up until March 2013 when US Authorities decided to seize the Liberty Reserve website and freeze all the accounts ... including the accounts of good guys like us :(
  • Paypal, but then paypal decided to block our account until we stop selling our spy software. Although it is easy to open new accounts, paypal makes charge-back fraud too easy for criminals ... and unfortunately criminals like hacking software.
  • Over the years we also tried many others, but have decided to only continue with Webmoney and Bitcoins. We also still accept credit card payment via Avangate, but only for some of our products.
Why Webmoney?
We have been using them for over 10 years without any problems. Unfortunately, webmoney is not well known or used in most western countries (mostly used by Russia).

Why Bitcoins?
We LOVE Bitcoins!!

Bitcoins are not controlled by a central company or entity ... it is controlled by people. There is no single website or domain that can be seized by the authorities, no single person or company that can decide to close your account. 

To find out more about bitcoins, go to http://bitcoin.org
.. or, if you just quickly want to buy bitcoins and use your bitcoins to purchase a redpill product, you can use a company like: http://localbitcoins.com

What if you only have Perfect Money and you need to purchase?

You can create a Bitcoin account at a company like http://localbitcoins.com and then use a company like https://p2pchange.is (there are many others to choose from) to quickly convert your PM to bitcoins. 

How to purchase from redpill using Bitcoins

Go to www.redpill.co.za and click on Purchase. Select the Bitcoin option and click on the purchase button. Follow the instructions.

Important: Our Bitcoin address is changed on a regular basis. Do not use a bitcoin address that you used previously. Always go to the purchase page and get the latest bitcoin address.

Once you did the purchase, contact us so that we can verify the payment.

Please note: Sites that we referred to in this article are sites that we have used in the past and found that they are good to use. We however have nothing to do with these sites and you use them on your own risk.

Monday, 4 April 2016

How to successfully install spy software

To successfully install spy software remotely and secretly you will need:

  • A powerful hacking program.
  • Expert hacking skills (not to worry, read on).
  • A bit of luck

redpill Hacker can help you with the first two. It is a powerful hacking program with various hacking tools. It is also designed to turn any beginner hacker into an expert by helping you choose the correct tools for the job.

When you create a payload (the module that will be attached to an email and will secretly install the spy program on the remote computer), redpill Hacker will help you make the right choices to improve your chances of a successful hack.

How to make the right choices


On the payload selection screen, redpill Hacker will display information about each selection you make just below the selection box. It is very important that you read the information about your current selection.

  1. The Payload Type – This is the type of spy program that will be installed. Carefully read the description of your selection, as each program comes with its pro's and con's.
  2. Attachment Type – This is how the payload will be attached. Again, you need to carefully read the description of each selection as some attachment types are not supported by some email services.
  3. Social Engineering Template – This is your 'con'. As the target will need to open the attachment, the 'con' is used to convince the target to do just that. There are various templates to choose from and the description box will explain how the selected con works. Remember that you will be able to edit the details of the template on the next screen.

Some More Tips:

  • If possible, create an email account with the same email provider as the target (example, yahoo, gmail, etc.) and then do a full test from beginning to end.
  • Edit your templates or create your own. Although each customer gets a unique edition (build) of redpill Hacker, they all get the same default templates. If you use the templates 'as is', it will increase the risk that the email will be detected as a possible threat.
  • Create an alias account (fake profile) and take some time to establish communication (trust) with the target. Only send the payload when there is a high level of trust and when the target is expecting the attachment. Just sending it blindly rarely works. 


What about the third requirement, 'luck'?

There is a lot that can go wrong - wrong operating system or a very security aware target (just to name two). Not all attempts will succeed, but you can increase your chances of success!

Want to know more, have a look at some redpill Hacker videos.

Friday, 18 March 2016

Installing redpill Spy

redpill Spy is a computer monitoring program that can be used to monitor the computer in your home or office. You need to have access to the computer to install and set it up. It can secretly monitor a computer (only you will know), but it cannot be installed remotely.

For software that can be secretly installed remotely see redpill Hacker.

redpill Spy is completely hidden and discreet, but because it is installed by you (not remotely), only some attempts are made to avoid detection and removal by anti-virus. It will bypass some Anti-Virus but not all. If your Anti-Virus detects and removes redpill Spy, follow the steps below:

Note: We will use Windows Defender in the examples below, but all Anti-Virus packages has similar features.

1. Temporarily Disable your Anti-Virus

Click on the Windows start button > Settings > Update & Security and turn off Real Time Protection (you will turn it back on when done).


2. Install redpill Spy

Use the link that redpill emailed you to download the install file and install redpill Spy. If SmartScreen blocks the install, click on 'More Info'.


On the next screen click on 'Run Anyway'.


Complete the install. You will get a message saying, 'Your computer is now being monitored'.

Note: You can delete the install file as it is not needed. This is recommended to avoid anyone else from finding out that redpill Spy is installed on the computer.

3. Add Exclusion to your Anti-Virus

You will be adding a program folder to your Anti-Virus exclusion list. Nothing in your anti-virus removal list will indicate that it is for redpill Spy, so no one will know that it is for redpill Spy. The program name that you will add will also be unique to your installation, so no one can google that program folder to find out what it is for.

In your Anti-Virus, click on 'Add Exclusion'.


Select to exclude a Folder.



To help redpill Spy get past most Anti-Virus and to help keep it discreet and hidden, the folder name will be different with each installation. To find out what the folder name is and to exclude it do the following:
  1. In the Select Folder dialog box, go to your Program Folder (usually C:\Program Files), and click the 'Date Modified' heading so that the folders are sorted by date modified. 
  2. The latest folder created will be the redpill Spy folder as it was just installed. Note in the example above it is 'Fstyz' but yours will be different.
  3. Select that folder and click on 'Exclude Folder'.


4. Turn Real Time Protection back on.

Now that you have excluded that folder from being scanned by your Anti-Virus, you can turn your protection back on.


5. Register redpill Spy

Open Notepad (or any other program where you can type anything) and type the word 'redpill'. The registration screen will open.
Note: 'redpill' is the default 'password' for redpill Spy, but you can change it once you registered it.


Click on 'Register Now' and email redpill the registration number. redpill will email you a key that you can enter that will register redpill Spy.

Next time you type the secret password (by default 'redpill') in any program, redpill Spy will open.


For more information about redpill Spy or more advanced hacking tools, go to the redpill website.

Friday, 4 March 2016

redpill Hacker 5


redpill Hacker 5 has been released. redpill Hacker is penetration testing software (ethical hacking) and can be used to monitor any number of computers (unlimited).

What's new in Version 5?

redpill Hacker has multiple hacking tools and various ways to create payloads (a payload is the delivery package that will secretly install the spy module that will monitor a computer).

Choosing the correct combination of payload type, attachment type and social engineering template to use is important to increase your chances of a successful hack. The type of payload you use will also depend on your target and objectives.

Version 5 will help you make the correct choices ...


With each selection the pro's and con's are explained to help you make the right choices when creating a payload. The payload setup screen has also been simplified.



redpill Hacker can turn anyone into a professional hacker. It will even create phishing websites and payload website for you.

For more information about redpill Hacker visit: www.redpill.co.za
You can also watch some training videos (most videos are from earlier versions but you will still get a good idea of how it works).


Thursday, 3 March 2016

Enter redpill Hacker

Congratulations on your purchase of redpill Hacker!

After you paid for redpill Hacker (you can purchase here) you will have to wait a couple hours as each customer gets a unique build - your own unique edition of redill Hacker! The reason for this is to help avoid detection.

When your redpill Hacker is ready redpill will email you a download link. Please follow the steps below to make sure you get the most out of your redpill Hacker.


Step 1: Download your install file and keep a copy

Download your install file from the link that redpill emailed you. Save a copy of the install file in a safe place - preferable on a separate device. redpill do not keep copies as each customer gets a unique install file. If you loose your install file, you will need to pay the rebuild fee to get a new one.

Step 2: Install redpill Hacker and exclude from AV

The payloads (spy install modules) redpill Hacker create has Anti-Virus Counter Detection and attempts to avoid detection. No attempts are however made to hide redpill Hacker itself (the program you use to create the payloads) from detection as it will only be installed on your computer.

Some Anti-Virus including Windows Defender will detect and remove redpill Hacker.
For this reason, you will need to disable your Anti-Virus before you install and add the redpill Hacker program folder to your Anti-Virus list of exclusions. You will enable your Anti-Virus again after these steps.

These instructions are for Windows Defender but all Anti-Virus will have these features.

Open Windows Defender and turn off real-time protection.


Install redpill Hacker. Go back to Windows Defender (or your Anti-Virus) and add an exclusion.


Click on add Folder and browse for your redpill Hacker program folder. See Program Folder in the image below.


The image above also shows the payload folder but you can ignore that for now and just add the program folder.

You can now turn on your Real-Time Protection again.


Step 3: Register redpill Hacker

When you open redpill Hacker for the first time you will be asked to enter a key and a registration number will be displayed. Email that number to redpill. They will email you a key that you can enter to register redpill Hacker.

After you entered the key, redpill Hacker will open.


After it opened, check that your name is in your unique edition of redpill Hacker. This is to ensure that you got the correct edition.

Step 4: Protect your payloads

The payloads you create (spy install modules) will attempt to bypass Anti-Virus detection. However, exposing them to unnecessary anti-virus scans is a very bad idea.  The more your payloads are scanned, the bigger the possibility will become that your Anti-Virus will find a common 'fingerprint' among all your payloads (build by your unique edition) and submit it to the their virus definition database that will greatly increase your detection rate.

If this happens you will need to pay for a rebuild of your redpill Hacker. So to prevent this from happening, it is a good idea to add your payload folder to your Anti-Virus exclusion list so that your payloads will not be scanned by your Anti-Virus.

Follow the steps above and again temporarily disable real time protection in your Anti-Virus.
Create one payload (see these instructions if you don't know how).
Go to payloads, select the one you created and click on 'Open Payload Location'. You need to add that folder you your list of exclusions as well.

Follow the instructions above and add the payload folder. By default it will be in 'Documents' but you can choose to create and use another folder.


You should now have two folders in your exclusion list.

Remember to turn your Real Time Protection on again.

Step 5: Hack The World

There are a lot of examples and training articles in this blog. Remember to start small and get in some training before attempting to hack a real target.

Saturday, 6 February 2016

redpill Hacker payloads now supports PDF


redpill Hacker 4.1 is now available. redpill Hacker is a hacking program that allows you to create different types of payloads (spy install modules that can be remotely and secretly installed). You can create different types of payloads that you can customize. You can also choose from a list of attachment types.

Two new attachment types have been added in version 4.1:
  1. PDF using normal file extension spoofing - this could also be done manually in the past. The new version has a payload with a PDF icon.
  2. PDF using RTLO Spoofing (Right To Left Override exploit). In the past it was needed to download and purchase a separate hacking tool to do this. This feature is now build into redpill Hacker.
There is also a new PDF Lightweight payload that will have a PDF icon.

The payloads can perform various tasks including:
  • installing key loggers
  • secretly taking screenshots
  • secretly sending you documents from the target computer. 
For more information about redpill Hacker go to the redpill website:  www.redpill.co.za


Thursday, 14 January 2016

Legal to monitor employees


An European court just ruled that it is legal for employers to monitor employees. This ruling came after an employee took an employer to court for reading his personal and very private messages.
Read the full story here.

Remember that laws differ from country to country and you also need to look at the specifics of each case.

Legal doesn't always mean right.

Just because you are legally allowed to do something doesn't always mean it is morally the correct thing to do. You might (will) get employers that are more concerned (or even obsessed) with invading employees privacy than monitoring them to ensure company resources are not wasted.

The same thing goes for spouses that want to monitor each other. Just because you can, doesn't mean you should. If you are secretly monitoring your spouse, aren't you the one breaking the trust?

There are however times when spying is the right thing to do.

When you already know there is a problem - if you are 90% sure that your spouse is having an affair and you just need that final proof ... then secretly installing spy software might just be what you need to do. Not everyone can afford a private investigator. Spy software like redpill Spy is sometimes all you need to know the truth.

Don't be a victim - it is YOUR life and you also deserve to be happy.

The same goes for a company. You worked hard building you company from the ground up - you don't need to be satisfied with employees that are not really working or even selling company secrets to the competition.

What if the person you want to monitor is not an employee or spouse?

If legal doesn't always mean right - does illegal always mean wrong?

It is possible to secretly and remotely install spy software using a tool like redpill Hacker and still be within the law. Examples would be doing penetration testing for a company and legal investigations.

There will then also be grey areas where strictly speaking it might be illegal like hactivists fighting for a good cause.

Another real world example was a ethical hacker that used redpill spy software to remotely install a keylogger on a scammer that was stealing money from people over the internet selling cute puppies and cars that didn't exist. The scammer was from another country (Nigeria), so to successfully prosecute the scammer would have been very difficult and we all know that very little happens if these cases are reported to local authorities. The hacker got into all the scammer's email accounts (he had a lot) and could see who he was busy scamming. He informed all his victims what was going on (using the scammers email accounts!). He also informed all his family and friends what he was doing and attached many screenshots as proof.
- legal? - not sure
- right thing to do? - you decide

Then there will obviously be a lot of examples where it is just completely illegal and wrong to secretly install spy software on someone's computer.

Please remember:
redpill never encourage or condone the illegal use of its products. Never use redpill products in an illegal manner.