i4info Provides the best hacking Material. Latest hacking tutorials and tools are available here. It is the best place for hackers.

Latest topics

» Private SQL Dorks [Daily Updates]
Yesterday at 2:49 am by Admin

» Teen Patti Gold Hack & 3 Patti Chips Code Extra Bonus 2016
Sun Oct 23, 2016 8:23 pm by Admin

» SQL Vulnerable Website
Sun Oct 23, 2016 5:04 pm by Admin

» YouTube Video Downloader (YTD) PRO
Fri Oct 21, 2016 7:02 pm by Admin

» PDF Decrypter Pro
Fri Oct 21, 2016 7:00 pm by Admin

» 2016 Dorks list
Thu Oct 20, 2016 5:49 pm by Admin

» PHP Mailer Script
Mon Oct 17, 2016 5:38 pm by Admin

» The Ultimate Interview Guide: 30 Prep Tips for Job Interview Success
Sun Oct 16, 2016 5:32 pm by Admin

» How to track who visited my Facebook profile?
Sun Oct 16, 2016 12:59 am by awarii

October 2016


Calendar Calendar


free forum

Forumotion on Facebook Forumotion on Twitter Forumotion on YouTubeForumotion on Google+

Visitors Counter

Flag Counter

About Author

Muhammad Shahroze Rashid
Web Developer
Web Developer & Designer,Researcher and Technical writer. An Information Security Consultant and System Auditor, a keen Security researcher.
lahore, Punjab
[email protected]
DOB: 05/25/1992
Muhammad Shahroze Rashid
Muhammad Shahroze Rashid is a Web Developer and Designer, Android Developer, InfoGrapher, IT consultant and Researcher
Reviewed by Google
Date published: 01/19/2016
9 / 10 stars
Muhammad Shahroze Rashid
Muhammad Shahroze Rashid Web Developer & Designer,Researcher and Technical writer. An Information Security Consultant and System Audito

How to create your own keylogger?



Posts : 438
Reputation : 3
Join date : 2014-12-10
Age : 24
Location : Pakistan

How to create your own keylogger?

Post by Admin on Thu Jan 14, 2016 3:51 pm


A keylogger is a program that runs in the background on someones computer that logs every key they press, and then sends the log of all the pressed keys to the attacker. This essentially allows you the ability to collect all the usernames and passwords typed in.

What you need:

  • Vulcan logger - [You must be registered and logged in to see this link.]

  • A new e-mail address specifically for keylogging

    1. After you downloaded the program, open it up and you should see the builder. Input YOUR email username & password into the boxes. The reason we are doing this is because the keylogger will log INTO your email, then email yourself the logs. I recommend making a new email specifically for keylogging.


    1. Select what email provider you are using here. If you are using gmail, select the first provider, if you are using yahoo, select the second provider, if you are using hotmail or live, select the third option.


    1. Input the subject of the message you will receive every time you receive a keylog. Most people put "Facebook Logger" or something similar.


    1. I recommend checking both of these boxes. The computer info will send the slave's IP address and their computer name. The screenshot will send a picture of the slave's screen whenever the log was sent.


    1. This is the time in between the logs. I usually recommend 5-15 minutes.


    1. At this point I suggest you click Test Email and make sure everything is working fine.


    1. This is what the Icon of the output file will be. It will ONLY take in .ico's. If you do not have any, I suggest either downloading them online, or creating your own. At [You must be registered and logged in to see this link.] you can upload a PNG file and it will convert it to ICO for you.
      Some anti-viruses will detect an icon if it has been used before for malware, so I recommend getting some more obscure icons that have not been used before. After you locate the .ico it should appear in the box located to the right of the browse button.


    1. Click the Extra Options Tab at the top of the builder.


    1. The add to startup option will make the slave file go on startup on the slave's computer, so whenever he reboots his computer, he will become keylogged again. The melt option will make the file go hidden when it is first run. I usually recommend that you check both of them.


    1. This option will allow you to display an error message when the file is first run by the slave. Common messages are "This file is not compatible with your computer."


    1. The Use Downloader function will download and execute a file on the first run of the slave file. You can do this if you want it to execute many different viruses, its a better alternative to binding. Make sure you put a direct link to the file.
      The Website Visitor function will automatically visit the website on run. It will pop up in the default web browser.


    1. I strongly recommend that you check both of these functions. They will decrease the detection rate and make your logger more secure from whalers. I also recommend that you click Generate Key a few times to get a unique key. This is generating an encryption key to keep all of your information secure.


    1. Now click on the Assembly & Build Tab.


    1. Click the "Randomly Generate" button. Now you can change the assembly to whatever you want it to say. For example, if you want to disguise this as a runescape product, you should change the company to "Jagex LTD." and the Product to "Runescape" and the Copyright to "Jagex LTD. All Rights Reserved". I do not suggest changing the version and File Version.
      Below is an example:


    1. This is a file pumper, it will increase the size of the output file. You should keep this at 0 unless you want to increase the size of your slave file.


Change the File Name to whatever you are disguising the file as, for example you can change it to "Runescape Pin Generator". Now click build. Wait a bit and it should give you the following message:

  • All you have to do now is go to the folder where your builder is located and you should notice your slave file. You can send it to all your friends now! Remember, to tell which anti-viruses detect your file ONLY use elementscanner.com. Do not use ANY other site.

    Current date/time is Fri Oct 28, 2016 11:30 pm