Skip to main content

Posts

Showing posts from 2017

New Hacker Training Articles

A couple of new hacker training articles were added to the redpill website. These articles include instructions on how to hack without being detected, how to remotely install a spy program and more. Below are a list of the new articles.
Hacker JargonHow to Remotely Install a Spy ProgramHow to hack in the secretSocial EngineeringAnti-Virus Detection - how it works and how to bypass it. More articles and videos coming soon ....

New redpill website

redpill Hacker has a new home. Our new website (www.redpill.co.za) has a cool new look and is also mobile friendly. It was important for us to make our new site mobile friendly as we will be adding training articles to the site. To launch our new site we are offering redpill Hacker at the reduce price of $99 for a limited time (once off payment).

The training articles that we are planning to add will include the following:

How to install key loggers remotely.How to install spy programs via email.Creating websites with payloads (spy software that can be installed secretly and remotely).Creating password phishing websites to capture usernames and password.How to use social engineering to install spy software.SQL Injection, the darknet and many more. This blog also has training articles but we are planning more structured online training on the redpill website.

Why we need hackers and hacktivists

In a perfect world, we could all sit back and just trust that our governments will do the 'right thing'. We can believe that the CIA, FBI, NSA are the good guys and there to help and protect us. We can believe that they are the 'good guys' and they are protecting us from the 'bad guys'. In a perfect world ...

The problem is we do not live in a perfect world. You just need to read the news to see how governments are hacking one another. How the 'good guys' wants more power and control to protect us from the 'bad guys' but how they misuse and abuse their power.

I live in South Africa and on a daily basis we read in the news how top government officials - even, and especially in the police and security sector - are attacking one another and exposing how the others are using their positions for self enrichment through corruption.

We live in the real world where there are no black and white (100% right or 100% wrong), but multiple shades of grey. No…

How Hackers Bypass Mobile Verification

Please Note: The purpose of this article is to inform people of how hackers can steal information and to prevent the illegal and criminal use of Penetration Testing Software like redpill Hacker.


Cyber-criminals can install key loggers on your computer to get your login details. Sites that require a more secure form of log-in will send a verification code to the user's mobile phone (SMS - OTP) to prevent this type of attack. It is mostly banks but also other sites (think of Google's two step verification) that uses this method.

So how do hackers get past the mobile verification step?

Easy - The ask the user what the code is! It is called social engineering and this is how it works:

They get information about you - usually everything they need they can get from your facebook account. All they need to get started is your email and phone number.They then use hacking tools to get your username and password from your computer.They will then give you a call claiming to be from the com…