www.i4info.org

i4info Provides the best hacking Material. Latest hacking tutorials and tools are available here. It is the best place for hackers.

Latest topics

» Facebook Account Hacked
Today at 10:14 am by ssameer758

» Teen Patti Gold Hack & 3 Patti Chips Code Extra Bonus 2016
Today at 8:31 am by furqansweet73

» BitCoin Wallet stealor New
Wed Dec 07, 2016 7:46 pm by Admin

» Muhammad Shahroze Rashid | Marketing Consultant
Wed Dec 07, 2016 1:48 pm by Admin

» Muhammad Shahroze Rashid | Sharp Mind, Sharp Innovations
Wed Dec 07, 2016 1:47 pm by Admin

» How to design an effective job ad
Wed Dec 07, 2016 1:45 pm by Admin

» Content Marketing | Promotional Video
Fri Dec 02, 2016 2:45 pm by Admin

» How to start an Online Business | Complete Guide
Fri Dec 02, 2016 2:30 pm by Admin

» Zeeshan Bhatti
Wed Nov 30, 2016 3:18 pm by Admin

December 2016

MonTueWedThuFriSatSun
   1234
567891011
12131415161718
19202122232425
262728293031 

Calendar Calendar

Affiliates


free forum

Forumotion on Facebook Forumotion on Twitter Forumotion on YouTubeForumotion on Google+

Visitors Counter


Flag Counter

About Author

Muhammad Shahroze Rashid
i4info
Web Developer
Web Developer & Designer,Researcher and Technical writer. An Information Security Consultant and System Auditor, a keen Security researcher.
samanabad
lahore, Punjab
54000
Pakistan
[email protected]
03064904829
DOB: 05/25/1992
Muhammad Shahroze Rashid
Muhammad Shahroze Rashid is a Web Developer and Designer, Android Developer, InfoGrapher, IT consultant and Researcher
Reviewed by Google
Google
Date published: 01/19/2016
9 / 10 stars
Muhammad Shahroze Rashid
Muhammad Shahroze Rashid Web Developer & Designer,Researcher and Technical writer. An Information Security Consultant and System Audito
samanabad
lahore
Punjab
54000
Pakistan

How to create your own keylogger?

Share

Admin
Admin

Posts : 455
Reputation : 5
Join date : 2014-12-10
Age : 24
Location : Pakistan

How to create your own keylogger?

Post by Admin on Thu Jan 14, 2016 3:51 pm


CREATING A KEYLOGGER



A keylogger is a program that runs in the background on someones computer that logs every key they press, and then sends the log of all the pressed keys to the attacker. This essentially allows you the ability to collect all the usernames and passwords typed in.

What you need:

  • Vulcan logger - [You must be registered and logged in to see this link.]

  • A new e-mail address specifically for keylogging





    1. After you downloaded the program, open it up and you should see the builder. Input YOUR email username & password into the boxes. The reason we are doing this is because the keylogger will log INTO your email, then email yourself the logs. I recommend making a new email specifically for keylogging.



 



    1. Select what email provider you are using here. If you are using gmail, select the first provider, if you are using yahoo, select the second provider, if you are using hotmail or live, select the third option.



 



    1. Input the subject of the message you will receive every time you receive a keylog. Most people put "Facebook Logger" or something similar.



 



    1. I recommend checking both of these boxes. The computer info will send the slave's IP address and their computer name. The screenshot will send a picture of the slave's screen whenever the log was sent.



 



    1. This is the time in between the logs. I usually recommend 5-15 minutes.



 


    1. At this point I suggest you click Test Email and make sure everything is working fine.



 



    1. This is what the Icon of the output file will be. It will ONLY take in .ico's. If you do not have any, I suggest either downloading them online, or creating your own. At [You must be registered and logged in to see this link.] you can upload a PNG file and it will convert it to ICO for you.
      Some anti-viruses will detect an icon if it has been used before for malware, so I recommend getting some more obscure icons that have not been used before. After you locate the .ico it should appear in the box located to the right of the browse button.



 


    1. Click the Extra Options Tab at the top of the builder.



 



    1. The add to startup option will make the slave file go on startup on the slave's computer, so whenever he reboots his computer, he will become keylogged again. The melt option will make the file go hidden when it is first run. I usually recommend that you check both of them.



 



    1. This option will allow you to display an error message when the file is first run by the slave. Common messages are "This file is not compatible with your computer."



 



    1. The Use Downloader function will download and execute a file on the first run of the slave file. You can do this if you want it to execute many different viruses, its a better alternative to binding. Make sure you put a direct link to the file.
      The Website Visitor function will automatically visit the website on run. It will pop up in the default web browser.



 



    1. I strongly recommend that you check both of these functions. They will decrease the detection rate and make your logger more secure from whalers. I also recommend that you click Generate Key a few times to get a unique key. This is generating an encryption key to keep all of your information secure.



 


    1. Now click on the Assembly & Build Tab.



 



    1. Click the "Randomly Generate" button. Now you can change the assembly to whatever you want it to say. For example, if you want to disguise this as a runescape product, you should change the company to "Jagex LTD." and the Product to "Runescape" and the Copyright to "Jagex LTD. All Rights Reserved". I do not suggest changing the version and File Version.
      Below is an example:



 



    1. This is a file pumper, it will increase the size of the output file. You should keep this at 0 unless you want to increase the size of your slave file.



 



Change the File Name to whatever you are disguising the file as, for example you can change it to "Runescape Pin Generator". Now click build. Wait a bit and it should give you the following message:


  • All you have to do now is go to the folder where your builder is located and you should notice your slave file. You can send it to all your friends now! Remember, to tell which anti-viruses detect your file ONLY use elementscanner.com. Do not use ANY other site.


    Current date/time is Sun Dec 11, 2016 2:46 pm