Showing posts with label Keyloggers. Show all posts
Showing posts with label Keyloggers. Show all posts

Hiding RATs,Trojans and Keyloggers from Antivirus.

Recently , Zain posted how to make a pro rat server to hack victims computer in order to get all the saved passwords, related to Facebook, Twitter, and many others. Also you may get the screen shots of the infected computer. Today, I am telling you how to hide such severs, Torjans and RATs also keyloggers from Antivirus since all are of same kind. Here, we shall use a simple software, also hex editing can be done to make this possible, Later i will post about Hex editing also, Don't worry hackersthirst will be complete guide for those beginners who want to learn such things for getting more secure.

This program is used by programmers and other experts to make there softwares secure from crackers and hackers, We shall use this to make our trojans, Servers, Keyloggers and much more secure in order to hide them from antivirus.
Steps:
1) First of all download this software from here.

2) After downloading the application, install it and then run it. After running load your any application or trojan which you want to hide from antivirus like this:
3) Select the following options, Like i did below:
4) Now, Select following options and protect your server or trojan.

You are done, You will see that an old and new file is created in that same folder, Like below, I have tested this for Pro-Rat.
Checking With Antivirus:
So, Now lets scan with an updated antivirus:

You may check it with other antivirus, I have scanned using an updated antivirus (Eset as you can see).

Note: You can also use Cyber-gate instead of pro-rat. Also, This trick doesn't work for all Keyloggers and RATs. - See more at: http://www.hackersthirst.com/2011/03/hiding-ratstrojans-and-keyloggers-from.html#sthash.9J0o2SJa.dpuf

Ardamax Keylogger Cracked-Hack Emails, Facebook etc

Ardamax Keylogger Cracked-Hack Emails, Facebook etc.



ardamax-free
Many people search for a better keylogger but they don’t want to spend a single peny to achieve this goal and inshort they don’t buy a keylogger.  But I am providing a free and cracked ardamax keylogger that is available in market too but only at trial basis. Inorder to use it for free then follow my hack procedure:-

Download Ardamax Keylogger-Crack included:-

You can download ardamax keylogger below:-
Sorry! We are no more promoting the crack files, Otherwise we shall be accused of exiting the hackers, since we have found that mostly this software has been misused. Sorry, for inconvenience.

How to use Crack for Ardamax Keylogger:-

Extract the downloaded package, Open it and then install ardamax by running “Setup ardamax”.
After that in the extracted package; open folder “Files to be replaced” and then copy “POL” and go to the directory where you have installed ardamax and pase the “POL” there, remember there will be already “POL” present just replace that with the “POL” given in the cracked package by hackersthirst. Cheers you are done now just run Ardamax Keylogger and use it for free.
A tutorial about how to use ardamax has been posted here:- How to: Use Ardamax to Hack Facebook, Twitter and Email's It will include that how can we hack Facebook, Twitter and other email id’s using ardamax. To get latest updates just subscribe to Us by Email below.

What: basic features are in ardamax:-

1- Allows you to setup a remote keylogger server to hack victim remotely by just using an .exe file and sending it through email or other means.
2- Keylogged passwords can be sent to hacker by couple of ways like ftp, email etc.
3- You can also get screen shots of the victim computer.
4- Its quite easy to use and you can make remote keylogger server in seconds
5- Can change icon of the generated remote keylogger server.
6- You can monitor any computer running Windows easily in seconds.
Inshort all features of keyloggers are present in ardamax.
- See more at: http://www.hackersthirst.com/2011/06/ardamax-keylogger-cracked-hack-emails.html#sthash.LrgHX9wg.dpuf

Hack Remote PC by Keylogger!


আজকের কিলগার টির নাম reflect keylogger ।
এটা দ্বারা একটি শক্তিশালী keylogger বলতে পারেন ।
ভিকটিমের পিসিতে একবার চালাতে পারলে  ভিকটিম যা যা টাইপ করবে তা আপনার কাসে চলে আসবে ।
ডাউনলোড করতে এখানে ক্লিক করুন ।
আপনার এন্টিভাইরাস ডিজেবল করে দিবেন । ভাইরাসের ভয় থাকলে সেন্ডবক্স দিয়ে রান করান ।
এখন নিচের স্টেপ গুলোর মত করুন ।
(১) এবার ওপেন করুন দেখতে এরকম।
(২) Mailing option এ যান।
(৩)email username এ আপনার জিমেইল বা ইয়াহু আইডি দিন।
(৪) email password এ আপনার ইমেইল পাস দিন।
ভয় নেই হ্যাক হবেন না ।
প্রয়জনে  একটা নতুন আইডি ওপেন করুন ।
(৫) smtp server এ নিচের কোড দিন।
জিমেইল ইউজার রা : smtp.gmail.com
port : 587
ইয়াহু ইউজার রা : smtp.mail.yahoo.com
port : 465
এবার send test mail করুন।
নিচের স্কিন সুট টা দেখুন ।

সব কিছু ঠিক থাকলে আপনার মেইল এ একটা টেস্ট মেইল যাবে।
send interval এ আপনি কতক্ষণ পর পর ভিকটিম এর ইনফ পেতে চান সেই সময় টা দিন।
(৬) এবার option এ যান।কোন আপসন দিয়ে কি করতে পারবেন তা নিচে দেওয়া হলঃ
ক ) icon changer এ আপনি icon পরিবর্তন করতে পারেন।
খ ) file pumper এ আপনি ফাইল এর সাইজ বারাতে পারবেন। তার জন্য enable সিলেক্ট করে ফাইল সাইজ সিলেক্ট করে kiloby বা megaby এ পাম্প করতে পারবেন জাতে ভিক্তিম সন্দেহও করতে না পারে।
(৭) এবার compile option এ যান।
mutex option এ ৯ বার generate করুন।
(8) browse করে ফাইল এর একটা নাম দিয়ে সেভ করুন।
winrar দিয়ে rar করবেন।
ফাইল বাইন্ডার দিয়ে কন কিজেন বা প্যাচের সাথে বাইন্ড করে ভিকটিম এর কাছে পাঠিয়ে দিন।
তাকে বলবেন এটা প্যাচ তাই এন্টিভাইরাস ভাইরাস হিসেবে ডিটেক্ট করেন ।
তাই এটা কম্পিউটারে ঢুককানোর আগে  যেন সে এন্টিভাইরাস ডিজেবল করে দেয় ।
ভিকটিম ওপেন করলেই কেল্লাফতে।

How to use Keyloggers and Download Ardamax v3.0 Keylogger [Link Updated]

  !


Hello, In my last ICA article "What are Keyloggers ( A Hacking Tool )". I explain all basic info about Key-loggers. Hope You read that article befor this one. Because there i have explian its meaning and working.

NOTE : On,ICA i am explaining these tutorials only  for educational purpose .Beause before knowing the Security....You should understand all Hacking methods...and the author will not be liable for anything.

How Hackers use keyloggers to Hack passwords ?


Keylogger is a hardware device or a software program that records the real time activity of a computer user including the keyboard keys they press,as i explain in my last artilce. These keyloggers allow not only keyboard keystrokes to be captured but also are often capable of collecting screen captures from the computer. The keys they press are programmed to automatically transmit data over the network to a remote computer or Web server.

I am Going to explain the Hack using ARDAMAX KEYLOGGER. Because its best for Remote pc hacking.Here you just have to create a virus keylogger file and put that virus in victim's pc.Thats it !
Come ICA members,Lets start.....

DOWNLOAD ARDAMAX v3.0

After download ,Just install it..as a normal software. (Note : May be your  antivirus will not allow you to install this tool,or will show it as a Virus.Thats only because this a hacking tool.Not harful to your pc.) So lets start under an Assumption that u’ve installed Ardamax on ur computer.

1.) After installing the program, when you will run it for the first time, It may be ask for registration/serial key.I have provide the key in same file that you have download.So,enter the key and register it.

2.) After activating it, lets open it up. When you’ll open it, you’ll see an icon added into your system tray as shown in pic below.



3.)  Now lets right click on that icon & then click on “Remote Installation”. Now you should have something as shown in pic below



4.) Lets click on next and make sure that u should have the picture as below. In the option that says “Additional components” select ONLY “Log viewer”.


5.)  Now next screen would give you “Invisibility” options. This will help you to hide your key logger from your victim’s computer. So CHECK’EM all !



6.) Now next screen says “Security”, i personally don’t find it useful so you may just click on NEXT.

7.) Now the page that says “Web Update”, lets UNCHECK all off the boxes & click on NEXT.Web Update may fail your hack process.

8.)  Now you will see “Options” page. So select it the way i’ve done in the picture shown below.Hope my language is easy to understand for all ICA beginners.



9.)  Now here comes the most important page, which will show u the options and will let u select the way you want to receive the information from your victim’s computer.

You will have 3 options to receive victim’s info. I personally think that Email and network wouldn’t give u good performance. Lets select ONLY FTP, and rest of the information is already put in. So no need to change anything else.



What are ftp accounts ?

You will need to sign up with some free web hosting website. Which will give u some free web space and an FTP account. So this program will send all the information to your FTP account.That needed just to store data on net automatically from victim's pc.

Note :- You can Know more about "free hosting and How to see and upload files on A ftp"  In my one of the previos ICA Article "How to Hack using Phishing & 34 phishing scripts !".

10.) Now you should get a screen as shown in picture below where you’ll have to fill up your FTP details, so it can send information on it.
Here you have to enter your ftp hostname,username and its password.



11.) Once you’ve put the information, click on “test” button to check if it can connect it. And if its successful then u should get a msg like shown below.


12.) Now you’ll get “control” page, let it be the way it is and click NEXT

13.) Now you’ll get an option for “Screen shot”, which will send you screen shot of your victim’s computer. So adjust it as per your requirement and click NEXT.

14.)  Now you should see a page which will let you generate your keylogger’s file. So save it anywhere  u want but MAKE IT SURE U DON’T OPEN IT. You can change icon as well.



15.) Hey ICA members ,Thats it.You’re done!

What to do with this Generated Remote Keylogger File ?
What you need to do now is,  open this file on any computer u wanna hack (If you have physical access). Or  send this file to your victim via email,or any trick and let him open it and start enjoy ! when you send your keylogger to your victim, his anti virus may also detect it as a virus. So now its on you to convince him.Because once he/she will click this file,The keylogger will automatically intalled in his/her computer,withou showing any process or window.And will always work in hidden mode,even he restart the pc.This way,you will get all his data  he pressed on his keyboard with screenshots ,to your ftp account...which you mention duirng the making of this virus.

Note : If any ICA Members having any question or doubt,or he/she is not able to understand it...then please leave a comment or Msg me here on ICA.

Now at last Problem is this,If your Victim having Good antivirus or he is not recommending to turn off his Antivirus ,Just to test the file you send him,Then what to Do ? How to hack him ? How to make him Fool ?

There is Small Solution : Crypter and Binder .

Crypter : It encrypt the virus,So that antivirus will not able to detect it.But as i Explain that most antivirus becomes Too advance and providing latest virus updates daily.So its little bit difficult to bypass the antivirus.

Binder   : 
It Binds to files Together,Like a image "Jpeg" with a "Exe" Setup. Or two "Exe". This method is used to make fool your victim and convince him to click your Remote keylogger file.
I will explain the complete detailed article on Crypter an Binder later on ICA,so stay tuned...

Keylogger Tools


HACKER TOOLS



This is a nice collection of' "must have" tools for a hacker such as RAT, keylogger, mail bomber, crypter etc. The advantage of using this package is that all the tools are joined under the same GUI and all the tools are FUD i.e. they will not be detected by your antivirus. So I advice you to use them at your own risk. Alternatively you can use Sandboxie or Deep Freeze to protect your computer if something unexpected happens. Download here (Pass included in archive): http://www.mediafire.com/download.php?qz0myynoguy

EMAIL ACCOUNT HACKING SOFTWARE : GENERAL KEYLOGGER

General Keylogger is another keylogger program which records keystrokes and all the computer activity of the user on whose computer it is installed. There is no need to install it, it runs immediately after extraction from archive.  Download here:   http://www.ziddu.com/download/7012059/KEYLOG.rar.html  Password: hackingguide

EMAIL ACCOUNT HACKING SOFTWARE : WIN SPY KEYLOGGER

Win Spy Keylogger is a highly tweakable keylogger of all keyloggers. It includes many options such as screen capture, remote viewer etc. which makes it best of all other keyloggers. Download here:   http://www.mediafire.com/download.php?imzlun0w2m0

EMAIL ACCOUNT HACKING SOFTWARE : EASY KEYLOGGER

Easy keylogger is a password stealing program which records each and every keystroke typed by the user on his computer. The advantage of this keylogger is that it also sends IP address of the victim along with the keylogs and it is fully undetectable (FUD) kelogger. You can check by scanning the keylogger program at www.scanner.novirusthanks.org. .  Download here:   http://www.ziddu.com/download/6961655/KEYLOGGER.rar.html  Password: hackingguide

EMAIL ACCOUNT HACKING SOFTWARE : ISTEALER 4.0

IStealer is a password stealing trojan program which hacks passwords and secretly records all the typed keystrokes of the victim to which it is sent.  Download here:   http://www.ziddu.com/download/6953493/ISTEALER.rar.html  Password: hackingguide

IMAGE STEALING SOFTWARE : IMAGE WORM

Image Worm is a software which scans for all types of images on the local or remote computer and hacks them when it is executed. The resulting images after execution of Image Worm will be blank.
Download here:  
Password: hackingguide

EMAIL ACCOUNT HACKING SOFTWARE : VIC SPY KEYLOGGER

Vic Spy Keylogger is a simple keylogger program which records keystrokes and all the computer activity of the user on whose computer it is installed. There is no need to install it, it runs immediately after extraction from archive. 
Download here:  http://www.ziddu.com/download/6949476/VicSpy2008.rar.html  Password: hackingguide

EMAIL ACCOUNT HACKING SOFTWARE : ARDAMAX KEYLOGGER

Ardamax Keylogger is a small, easy to use keylogger which secretly records all the keystrokes typed by the user on his computer. Download here:   http://www.ziddu.com/download/6948973/ARDAMAXkeylogger.rar.html  Password: hackingguide