Exchange Your Money

Friday, 16 October 2015

হ্যাকিং লার্নিং :: কী-লগার দিয়ে যে-কারও কম্পিউটার হ্যাক করুন [অধ্যায়-১৫] How To Create Keylogger?


Hack All Passwords Form A Computer Remotely
Wanna hack passwords of Facebook, Gmail, Orkut and other online and offline passwords of your friends, enemies, girlfriend, boyfriend or your Ex this is the perfect article for you. A keylogger is a program that runs in the background on someones computer that logs every key they press, and then sends the log of all the pressed keys to the attacker. This essentially allows you the ability to collect all the usernames and passwords typed in.

NOTE:

This tutorial has some issues with E-Mail integration Check Latest and Working tutorial Here : CLICK HERE
What do we need?
  1. Vulcan logger
    Direct Download Link
  2. A new e-mail address specifically for keylogging
 How To Create Keylogger?
  • Download the program, open it up and you should see the builder. Input your email username & password into the boxes. The reason we are doing this is because the keylogger will log into your email, then email yourself the logs. I recommend making a new email specifically for keylogging.

  • Select what email provider you are using here. If you are using gmail, select the first provider, if you are using yahoo, select the second provider, if you are using hotmail or live, select the third option.
  • Input the subject of the message you will receive every time you receive a keylog. Most people put “Facebook Logger” or something similar.
  • I recommend checking both of these boxes. The computer info will send the slave’s IP address and their computer name. The screenshot will send a picture of the slave’s screen whenever the log was sent.
  • This is the time in between the logs. I usually recommend 5-15 minutes.
  • At this point I suggest you click Test Email and make sure everything is working fine.
  • This is what the Icon of the output file will be. It will ONLY take in .ico’s. If you do not have any, I suggest either downloading them online, or creating your own.

  • Click the Extra Options Tab at the top of the builder.
  • The add to startup option will make the slave file go on startup on the slave’s computer, so whenever he reboots his computer, he will become keylogged again. The melt option will make the file go hidden when it is first run. I usually recommend that you check both of them.
  • This option will allow you to display an error message when the file is first run by the slave. Here I used “Error Windows Can Crash” as title and “Your Antivirus Is Blocking Windows Process Pleas Turn Off Your AV” the Type should be “Error”.
  • The Use Downloader function will download and execute a file on the first run of the slave file. You can do this if you want it to execute many different viruses, its a better alternative to binding. Make sure you put a direct link to the file. [Not For Regular Users Or Newbies]
    The Website Visitor function will automatically visit the website on run. It will pop up in the default web browser.

  • I strongly recommend that you check “Add To Startup” And “Melt” functions. They will decrease the detection rate and make your logger more secure from whalers. I also recommend that you click Generate Key a few times to get a unique key. This is generating an encryption key to keep all of your information secure.

  • Now click on the Assembly & Build Tab.
  • Fill your info into it.
  • The file pumper will increase the size of the output file. You should keep this at 0 unless you want to increase the size of your slave file.
  • Change the File Name to whatever you want, for example you can change it to “Hcker”.

  • Now click build. Wait a bit.

Note:
Now get your build file and send it to your victims and get all information out of their computer. Use some attractive methods to persuade them to use your keylogger and anyhow jut make them run it once.
Download
Logger | Mirrors

Crack/Medicine Download

    

No comments:

Post a Comment

Related Posts Plugin for WordPress, Blogger...