Skip to main content

Know your redpill Hacker Payloads

redpill Hacker Payloads

What is a payload?

In computer security, payload refers to the part of malware which performs a malicious action. In redpill Hacker, the payload is attached to an email or a website and is delivered to the target PC. The payload will then secretly perform a specific action like installing a key logger or retrieving documents from the target computer.

Different types of payloads in redpill Hacker

There are different payloads in redpill Hacker and new ones being added with each new release. Some will only take screenshots while another will take screenshots and install a key logger. There is also another that will secretly retrieve all the documents from the target computer.

When you select a payload in redpill Hacker the details of the payload will be displayed to help you choose the right payload for the job.

Select Payload in redpill Hacker
Payloads are grouped into two main categories in redpill Hacker:
  1. Heavyweight Payloads - Does a lot. Takes screenshots, installs key logger and continue to run even after a computer is restarted.
  2. Lightweight Payloads - Only performs a specific tasks and only until the computer is restarted. 
Don't underestimate the Lightweight Payloads

Why would you choose a lightweight payload if it only runs until a restart and only performs a specific task? 

Think of lightweight payloads as the special forces of your army. They do less damage but they can get into places where your conventional forces will not be able to reach.

Lightweight payloads has a very low Anti-Virus detection rate and also bypass the Windows UAC Warning Message. With heavyweight payloads there are ways to deal with the UAC message but it requires a bit more social engineering. 

An example of a lightweight payload is the Document Grabber. It will secretly retrieve all the files in the documents folder (and all sub folders). Depending on what your investigation is all about, this might just be what you need. A lot of computer users store a password file on their computer with a list of their accounts with usernames and passwords.

Remember ...

Don't use redpill Hacker illegally. redpill Hacker should only be used for ethical (legal) hacking, penetration testing and security training. 


Popular posts from this blog

How to remotely install spy software

---------------------------------------------------------------------------------------------- Update (2015/07/07):  redpill now has a new and better product for installing spy software remotely: redpill Hacker
You can also have a look at newer articles with better tools at: -----------------------------------------------------------------------------------------------
In a previous article we discussed how to get usernames and passwords from other users on a computer you have access to. We will now look at how to install spy software on a computer you do not have access to … even if the computer is on the other side of the world.

Step 1: Get quality Spy Software

You will need quality spy software that can be remotely installed and is not easily detected and removed by anti-virus. There are a couple of key loggers that can be installed remotely, but very few that can secretly be remotely installed.

redpill Detective has been designed to be covertly installed…

Sending a spy program with gmail

To install a spy program remotely you need to email the target an install module. Spy software like redpill Agent and redpill Detective allows you to hide the install module within a 'cover application' . When emailing the target the install module, you will need either zip the file, embed it into wordpad or send it as a link as most email service providers doesn't allow you to add executables (exe's) as attachments.

To see how to send the spy program as a link see 'Installing spy software with a link'.
To see how to embed the spy program in wordpad, see  'How to remotely install spy software'.

Using a zipped file for the attachment can be a problem when either you or your target is using gmail as gmail will block attachments that contain executables even when they are zipped.

There is however a simple solution to the problem:

Add a password to your zip file

In winrar and winzip you can choose to add a password to your zip/rar file. When you add a passwo…

How to get a username and password

---------------------------------------------------------------------------------------------- Update (2015/07/07):  redpill now has a new and better product available: redpill Hacker

You can also see more up to date articles at:
This article will explain how to get a username and password for an email account like gmail or yahoo or a social network account like facebook.

In this article we will focus on getting a username and password of another user (the target) on a computer that you have access to. In a following article we will explain how to get a username and password from someone that works on a computer that you do not have access to that might be in another part of the world.

Step 1: Install a key logger

You will need to download and install a key logger that is not easily detected by anti-virus software and that is completely hidden and discreet