Skip to main content

Why we use Bitcoins

Yesterday, Perfect Money decided to block our account (because we are selling Penetration Testing Software - ouch! ... that is like being kicked out of hell because you are too bad! We thought we where the good guys compared to the rest of the crowd using Perfect Money).

So, as of yesterday, redpill will no longer directly accept Perfect Money (you can still use your PM, read on).

Over the more than 10 years we have been in this business, we used (and stopped using) a lot of different payment methods:

  • Liberty Reserve, up until March 2013 when US Authorities decided to seize the Liberty Reserve website and freeze all the accounts ... including the accounts of good guys like us :(
  • Paypal, but then paypal decided to block our account until we stop selling our spy software. Although it is easy to open new accounts, paypal makes charge-back fraud too easy for criminals ... and unfortunately criminals like hacking software.
  • Over the years we also tried many others, but have decided to only continue with Webmoney and Bitcoins. We also still accept credit card payment via Avangate, but only for some of our products.
Why Webmoney?
We have been using them for over 10 years without any problems. Unfortunately, webmoney is not well known or used in most western countries (mostly used by Russia).

Why Bitcoins?
We LOVE Bitcoins!!

Bitcoins are not controlled by a central company or entity ... it is controlled by people. There is no single website or domain that can be seized by the authorities, no single person or company that can decide to close your account. 

To find out more about bitcoins, go to
.. or, if you just quickly want to buy bitcoins and use your bitcoins to purchase a redpill product, you can use a company like:

What if you only have Perfect Money and you need to purchase?

You can create a Bitcoin account at a company like and then use a company like (there are many others to choose from) to quickly convert your PM to bitcoins. 

How to purchase from redpill using Bitcoins

Go to and click on Purchase. Select the Bitcoin option and click on the purchase button. Follow the instructions.

Important: Our Bitcoin address is changed on a regular basis. Do not use a bitcoin address that you used previously. Always go to the purchase page and get the latest bitcoin address.

Once you did the purchase, contact us so that we can verify the payment.

Please note: Sites that we referred to in this article are sites that we have used in the past and found that they are good to use. We however have nothing to do with these sites and you use them on your own risk.


Popular posts from this blog

Sending a spy program with gmail

To install a spy program remotely you need to email the target an install module. Spy software like redpill Agent and redpill Detective allows you to hide the install module within a 'cover application' . When emailing the target the install module, you will need either zip the file, embed it into wordpad or send it as a link as most email service providers doesn't allow you to add executables (exe's) as attachments.

To see how to send the spy program as a link see 'Installing spy software with a link'.
To see how to embed the spy program in wordpad, see  'How to remotely install spy software'.

Using a zipped file for the attachment can be a problem when either you or your target is using gmail as gmail will block attachments that contain executables even when they are zipped.

There is however a simple solution to the problem:

Add a password to your zip file

In winrar and winzip you can choose to add a password to your zip/rar file. When you add a passwo…

How to remotely install spy software

---------------------------------------------------------------------------------------------- Update (2015/07/07):  redpill now has a new and better product for installing spy software remotely: redpill Hacker
You can also have a look at newer articles with better tools at: -----------------------------------------------------------------------------------------------
In a previous article we discussed how to get usernames and passwords from other users on a computer you have access to. We will now look at how to install spy software on a computer you do not have access to … even if the computer is on the other side of the world.

Step 1: Get quality Spy Software

You will need quality spy software that can be remotely installed and is not easily detected and removed by anti-virus. There are a couple of key loggers that can be installed remotely, but very few that can secretly be remotely installed.

redpill Detective has been designed to be covertly installed…

How to get a username and password

---------------------------------------------------------------------------------------------- Update (2015/07/07):  redpill now has a new and better product available: redpill Hacker

You can also see more up to date articles at:
This article will explain how to get a username and password for an email account like gmail or yahoo or a social network account like facebook.

In this article we will focus on getting a username and password of another user (the target) on a computer that you have access to. In a following article we will explain how to get a username and password from someone that works on a computer that you do not have access to that might be in another part of the world.

Step 1: Install a key logger

You will need to download and install a key logger that is not easily detected by anti-virus software and that is completely hidden and discreet