Monday, 25 April 2016

Hacking Terms you need to know

On the spy software training blog you will come across various 'hacker' terms. Here are some of the important terms you need to know if you are interested in Penetration Testing (Hacking Tools and Spy Software).

Hacker Some believe that hacker means a skilled and enthusiastic programmer and that a 'cracker' is someone that breaks into system. In the sense that we will use hacker, a hacker is a person who uses computers to gain unauthorized access to data.
Penetration Testing Penetration Testing is when a company ask you to try to hack into their system. They sometimes want to do this to see if their system is secure, and if it is not (if you succeed), they want a report on how you managed to get into their system.
White Hat A 'White Hat' is a good hacker doing only ethical hacking. Examples would be to someone working for the authorities or a person doing Penetration Testing for a company.
Black Hat A black hat is a 'bad' hacker. Using his skills for criminal activities with no regard to people's privacy or damage caused.
Grey Hat A Grey Hat is a hacker that is sometimes willing to cross the line and do a bit of illegal hacking if he can morally justify what he is doing (even if it is just to himself).
Hacktivist A person who gains unauthorized access to computer files or networks in order to further social or political ends.
Target The person you want to monitor or the computer with the data you are looking for.
Social Engineering Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. redpill Hacker has various Social Engineering Templates that can be used for different scenarios. 
Con A con is a confidence trick. You trick someone into winning their confidence so that you can get them to divulge information or perform a task like opening an attachment. A con is part of a social engineering attack.
Payload In computer security, payload refers to the part of malware which performs a malicious action. In redpill Hacker, the payload is attached to an email or a website and is delivered to the target PC. The payload will then secretly install the spy software.
Phishing The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers, online.
Spear Phishing Spear Phishing is a more targeted attack. The attacker first spend some time finding information about the target. When the phishing email is then sent to the target, it contains a lot of personal information about the target – giving the target a sense of familiarity and trust.

Wednesday, 13 April 2016

Hacker Training Course

redpill started a training course for redpill Hacker. The course includes:

  • 8 Day Course (8 Lessons) that can be spread over a longer period.
  • 11 Practical Exercises where you 'attack' a real target (your instructor).
  • PDF Document with 30 pages of tips and advanced training topics.
  • Covers a wide range of topics including social engineering, payloads, password phishing, payload websites that install spy software and more.
  • The instructor will connect to your PC to help you with the exercises.
For prices and more information, 
visit the redpill hacker training page.

For more information about redpill Hacker, go to

Tuesday, 12 April 2016

Why we use Bitcoins

Yesterday, Perfect Money decided to block our account (because we are selling Penetration Testing Software - ouch! ... that is like being kicked out of hell because you are too bad! We thought we where the good guys compared to the rest of the crowd using Perfect Money).

So, as of yesterday, redpill will no longer directly accept Perfect Money (you can still use your PM, read on).

Over the more than 10 years we have been in this business, we used (and stopped using) a lot of different payment methods:

  • Liberty Reserve, up until March 2013 when US Authorities decided to seize the Liberty Reserve website and freeze all the accounts ... including the accounts of good guys like us :(
  • Paypal, but then paypal decided to block our account until we stop selling our spy software. Although it is easy to open new accounts, paypal makes charge-back fraud too easy for criminals ... and unfortunately criminals like hacking software.
  • Over the years we also tried many others, but have decided to only continue with Webmoney and Bitcoins. We also still accept credit card payment via Avangate, but only for some of our products.
Why Webmoney?
We have been using them for over 10 years without any problems. Unfortunately, webmoney is not well known or used in most western countries (mostly used by Russia).

Why Bitcoins?
We LOVE Bitcoins!!

Bitcoins are not controlled by a central company or entity ... it is controlled by people. There is no single website or domain that can be seized by the authorities, no single person or company that can decide to close your account. 

To find out more about bitcoins, go to
.. or, if you just quickly want to buy bitcoins and use your bitcoins to purchase a redpill product, you can use a company like:

What if you only have Perfect Money and you need to purchase?

You can create a Bitcoin account at a company like and then use a company like (there are many others to choose from) to quickly convert your PM to bitcoins. 

How to purchase from redpill using Bitcoins

Go to and click on Purchase. Select the Bitcoin option and click on the purchase button. Follow the instructions.

Important: Our Bitcoin address is changed on a regular basis. Do not use a bitcoin address that you used previously. Always go to the purchase page and get the latest bitcoin address.

Once you did the purchase, contact us so that we can verify the payment.

Please note: Sites that we referred to in this article are sites that we have used in the past and found that they are good to use. We however have nothing to do with these sites and you use them on your own risk.

Monday, 4 April 2016

How to successfully install spy software

To successfully install spy software remotely and secretly you will need:

  • A powerful hacking program.
  • Expert hacking skills (not to worry, read on).
  • A bit of luck

redpill Hacker can help you with the first two. It is a powerful hacking program with various hacking tools. It is also designed to turn any beginner hacker into an expert by helping you choose the correct tools for the job.

When you create a payload (the module that will be attached to an email and will secretly install the spy program on the remote computer), redpill Hacker will help you make the right choices to improve your chances of a successful hack.

How to make the right choices

On the payload selection screen, redpill Hacker will display information about each selection you make just below the selection box. It is very important that you read the information about your current selection.

  1. The Payload Type – This is the type of spy program that will be installed. Carefully read the description of your selection, as each program comes with its pro's and con's.
  2. Attachment Type – This is how the payload will be attached. Again, you need to carefully read the description of each selection as some attachment types are not supported by some email services.
  3. Social Engineering Template – This is your 'con'. As the target will need to open the attachment, the 'con' is used to convince the target to do just that. There are various templates to choose from and the description box will explain how the selected con works. Remember that you will be able to edit the details of the template on the next screen.

Some More Tips:

  • If possible, create an email account with the same email provider as the target (example, yahoo, gmail, etc.) and then do a full test from beginning to end.
  • Edit your templates or create your own. Although each customer gets a unique edition (build) of redpill Hacker, they all get the same default templates. If you use the templates 'as is', it will increase the risk that the email will be detected as a possible threat.
  • Create an alias account (fake profile) and take some time to establish communication (trust) with the target. Only send the payload when there is a high level of trust and when the target is expecting the attachment. Just sending it blindly rarely works. 

What about the third requirement, 'luck'?

There is a lot that can go wrong - wrong operating system or a very security aware target (just to name two). Not all attempts will succeed, but you can increase your chances of success!

Want to know more, have a look at some redpill Hacker videos.