Friday, 18 March 2016

Installing redpill Spy

redpill Spy is a computer monitoring program that can be used to monitor the computer in your home or office. You need to have access to the computer to install and set it up. It can secretly monitor a computer (only you will know), but it cannot be installed remotely.

For software that can be secretly installed remotely see redpill Hacker.

redpill Spy is completely hidden and discreet, but because it is installed by you (not remotely), only some attempts are made to avoid detection and removal by anti-virus. It will bypass some Anti-Virus but not all. If your Anti-Virus detects and removes redpill Spy, follow the steps below:

Note: We will use Windows Defender in the examples below, but all Anti-Virus packages has similar features.

1. Temporarily Disable your Anti-Virus

Click on the Windows start button > Settings > Update & Security and turn off Real Time Protection (you will turn it back on when done).


2. Install redpill Spy

Use the link that redpill emailed you to download the install file and install redpill Spy. If SmartScreen blocks the install, click on 'More Info'.


On the next screen click on 'Run Anyway'.


Complete the install. You will get a message saying, 'Your computer is now being monitored'.

Note: You can delete the install file as it is not needed. This is recommended to avoid anyone else from finding out that redpill Spy is installed on the computer.

3. Add Exclusion to your Anti-Virus

You will be adding a program folder to your Anti-Virus exclusion list. Nothing in your anti-virus removal list will indicate that it is for redpill Spy, so no one will know that it is for redpill Spy. The program name that you will add will also be unique to your installation, so no one can google that program folder to find out what it is for.

In your Anti-Virus, click on 'Add Exclusion'.


Select to exclude a Folder.



To help redpill Spy get past most Anti-Virus and to help keep it discreet and hidden, the folder name will be different with each installation. To find out what the folder name is and to exclude it do the following:
  1. In the Select Folder dialog box, go to your Program Folder (usually C:\Program Files), and click the 'Date Modified' heading so that the folders are sorted by date modified. 
  2. The latest folder created will be the redpill Spy folder as it was just installed. Note in the example above it is 'Fstyz' but yours will be different.
  3. Select that folder and click on 'Exclude Folder'.


4. Turn Real Time Protection back on.

Now that you have excluded that folder from being scanned by your Anti-Virus, you can turn your protection back on.


5. Register redpill Spy

Open Notepad (or any other program where you can type anything) and type the word 'redpill'. The registration screen will open.
Note: 'redpill' is the default 'password' for redpill Spy, but you can change it once you registered it.


Click on 'Register Now' and email redpill the registration number. redpill will email you a key that you can enter that will register redpill Spy.

Next time you type the secret password (by default 'redpill') in any program, redpill Spy will open.


For more information about redpill Spy or more advanced hacking tools, go to the redpill website.

Friday, 4 March 2016

redpill Hacker 5


redpill Hacker 5 has been released. redpill Hacker is penetration testing software (ethical hacking) and can be used to monitor any number of computers (unlimited).

What's new in Version 5?

redpill Hacker has multiple hacking tools and various ways to create payloads (a payload is the delivery package that will secretly install the spy module that will monitor a computer).

Choosing the correct combination of payload type, attachment type and social engineering template to use is important to increase your chances of a successful hack. The type of payload you use will also depend on your target and objectives.

Version 5 will help you make the correct choices ...


With each selection the pro's and con's are explained to help you make the right choices when creating a payload. The payload setup screen has also been simplified.



redpill Hacker can turn anyone into a professional hacker. It will even create phishing websites and payload website for you.

For more information about redpill Hacker visit: www.redpill.co.za
You can also watch some training videos (most videos are from earlier versions but you will still get a good idea of how it works).


Thursday, 3 March 2016

Enter redpill Hacker

Congratulations on your purchase of redpill Hacker!

After you paid for redpill Hacker (you can purchase here) you will have to wait a couple hours as each customer gets a unique build - your own unique edition of redill Hacker! The reason for this is to help avoid detection.

When your redpill Hacker is ready redpill will email you a download link. Please follow the steps below to make sure you get the most out of your redpill Hacker.


Step 1: Download your install file and keep a copy

Download your install file from the link that redpill emailed you. Save a copy of the install file in a safe place - preferable on a separate device. redpill do not keep copies as each customer gets a unique install file. If you loose your install file, you will need to pay the rebuild fee to get a new one.

Step 2: Install redpill Hacker and exclude from AV

The payloads (spy install modules) redpill Hacker create has Anti-Virus Counter Detection and attempts to avoid detection. No attempts are however made to hide redpill Hacker itself (the program you use to create the payloads) from detection as it will only be installed on your computer.

Some Anti-Virus including Windows Defender will detect and remove redpill Hacker.
For this reason, you will need to disable your Anti-Virus before you install and add the redpill Hacker program folder to your Anti-Virus list of exclusions. You will enable your Anti-Virus again after these steps.

These instructions are for Windows Defender but all Anti-Virus will have these features.

Open Windows Defender and turn off real-time protection.


Install redpill Hacker. Go back to Windows Defender (or your Anti-Virus) and add an exclusion.


Click on add Folder and browse for your redpill Hacker program folder. See Program Folder in the image below.


The image above also shows the payload folder but you can ignore that for now and just add the program folder.

You can now turn on your Real-Time Protection again.


Step 3: Register redpill Hacker

When you open redpill Hacker for the first time you will be asked to enter a key and a registration number will be displayed. Email that number to redpill. They will email you a key that you can enter to register redpill Hacker.

After you entered the key, redpill Hacker will open.


After it opened, check that your name is in your unique edition of redpill Hacker. This is to ensure that you got the correct edition.

Step 4: Protect your payloads

The payloads you create (spy install modules) will attempt to bypass Anti-Virus detection. However, exposing them to unnecessary anti-virus scans is a very bad idea.  The more your payloads are scanned, the bigger the possibility will become that your Anti-Virus will find a common 'fingerprint' among all your payloads (build by your unique edition) and submit it to the their virus definition database that will greatly increase your detection rate.

If this happens you will need to pay for a rebuild of your redpill Hacker. So to prevent this from happening, it is a good idea to add your payload folder to your Anti-Virus exclusion list so that your payloads will not be scanned by your Anti-Virus.

Follow the steps above and again temporarily disable real time protection in your Anti-Virus.
Create one payload (see these instructions if you don't know how).
Go to payloads, select the one you created and click on 'Open Payload Location'. You need to add that folder you your list of exclusions as well.

Follow the instructions above and add the payload folder. By default it will be in 'Documents' but you can choose to create and use another folder.


You should now have two folders in your exclusion list.

Remember to turn your Real Time Protection on again.

Step 5: Hack The World

There are a lot of examples and training articles in this blog. Remember to start small and get in some training before attempting to hack a real target.