Skip to main content

Installing redpill Spy

redpill Spy is a computer monitoring program that can be used to monitor the computer in your home or office. You need to have access to the computer to install and set it up. It can secretly monitor a computer (only you will know), but it cannot be installed remotely.

For software that can be secretly installed remotely see redpill Hacker.

redpill Spy is completely hidden and discreet, but because it is installed by you (not remotely), only some attempts are made to avoid detection and removal by anti-virus. It will bypass some Anti-Virus but not all. If your Anti-Virus detects and removes redpill Spy, follow the steps below:

Note: We will use Windows Defender in the examples below, but all Anti-Virus packages has similar features.

1. Temporarily Disable your Anti-Virus

Click on the Windows start button > Settings > Update & Security and turn off Real Time Protection (you will turn it back on when done).

2. Install redpill Spy

Use the link that redpill emailed you to download the install file and install redpill Spy. If SmartScreen blocks the install, click on 'More Info'.

On the next screen click on 'Run Anyway'.

Complete the install. You will get a message saying, 'Your computer is now being monitored'.

Note: You can delete the install file as it is not needed. This is recommended to avoid anyone else from finding out that redpill Spy is installed on the computer.

3. Add Exclusion to your Anti-Virus

You will be adding a program folder to your Anti-Virus exclusion list. Nothing in your anti-virus removal list will indicate that it is for redpill Spy, so no one will know that it is for redpill Spy. The program name that you will add will also be unique to your installation, so no one can google that program folder to find out what it is for.

In your Anti-Virus, click on 'Add Exclusion'.

Select to exclude a Folder.

To help redpill Spy get past most Anti-Virus and to help keep it discreet and hidden, the folder name will be different with each installation. To find out what the folder name is and to exclude it do the following:
  1. In the Select Folder dialog box, go to your Program Folder (usually C:\Program Files), and click the 'Date Modified' heading so that the folders are sorted by date modified. 
  2. The latest folder created will be the redpill Spy folder as it was just installed. Note in the example above it is 'Fstyz' but yours will be different.
  3. Select that folder and click on 'Exclude Folder'.

4. Turn Real Time Protection back on.

Now that you have excluded that folder from being scanned by your Anti-Virus, you can turn your protection back on.

5. Register redpill Spy

Open Notepad (or any other program where you can type anything) and type the word 'redpill'. The registration screen will open.
Note: 'redpill' is the default 'password' for redpill Spy, but you can change it once you registered it.

Click on 'Register Now' and email redpill the registration number. redpill will email you a key that you can enter that will register redpill Spy.

Next time you type the secret password (by default 'redpill') in any program, redpill Spy will open.

For more information about redpill Spy or more advanced hacking tools, go to the redpill website.


Popular posts from this blog

Sending a spy program with gmail

To install a spy program remotely you need to email the target an install module. Spy software like redpill Agent and redpill Detective allows you to hide the install module within a 'cover application' . When emailing the target the install module, you will need either zip the file, embed it into wordpad or send it as a link as most email service providers doesn't allow you to add executables (exe's) as attachments.

To see how to send the spy program as a link see 'Installing spy software with a link'.
To see how to embed the spy program in wordpad, see  'How to remotely install spy software'.

Using a zipped file for the attachment can be a problem when either you or your target is using gmail as gmail will block attachments that contain executables even when they are zipped.

There is however a simple solution to the problem:

Add a password to your zip file

In winrar and winzip you can choose to add a password to your zip/rar file. When you add a passwo…

How to remotely install spy software

---------------------------------------------------------------------------------------------- Update (2015/07/07):  redpill now has a new and better product for installing spy software remotely: redpill Hacker
You can also have a look at newer articles with better tools at: -----------------------------------------------------------------------------------------------
In a previous article we discussed how to get usernames and passwords from other users on a computer you have access to. We will now look at how to install spy software on a computer you do not have access to … even if the computer is on the other side of the world.

Step 1: Get quality Spy Software

You will need quality spy software that can be remotely installed and is not easily detected and removed by anti-virus. There are a couple of key loggers that can be installed remotely, but very few that can secretly be remotely installed.

redpill Detective has been designed to be covertly installed…

How to get a username and password

---------------------------------------------------------------------------------------------- Update (2015/07/07):  redpill now has a new and better product available: redpill Hacker

You can also see more up to date articles at:
This article will explain how to get a username and password for an email account like gmail or yahoo or a social network account like facebook.

In this article we will focus on getting a username and password of another user (the target) on a computer that you have access to. In a following article we will explain how to get a username and password from someone that works on a computer that you do not have access to that might be in another part of the world.

Step 1: Install a key logger

You will need to download and install a key logger that is not easily detected by anti-virus software and that is completely hidden and discreet