- Keylogger
- Keylogger Free
- What Is A Keylogger
- Keylogger Download
- What Is Keylogger
- What Is A Keyloggers
- Keylogger Mac
- Keylogger For Android
- Android Keylogger
- Keylogger Android
Keylogger Keylogger Download Keylogger For Android Keylogger Android What Is Keylogger What Is A Keylogger What Is A Keyloggers Keylogger Free Keylogger Mac Android Keylogger
Keylogger keyloggers virus typing passwords malware keylogging Keylogger Free Keylogger passwords keylogger What Is A Keylogger hackers data virus keylogger keyloggers hardware keyloggers malware Keylogger Mac Keylogger data via key antivirus keylogger Keylogger program internet installing keylogger operating keylogger What Is Keylogger keylogger keylogger keylogger keystrokes network keylogger malware keylogger malware Keylogger confidential What Is A Keyloggers Keylogger keyloggers passwords hardware keylogger device keystroke Keylogger Keylogger Free Keylogger malware data keylogger keylogging hackers keylogger Keylogger keyloggers data keylogger keyloggers children monitoring dangerous Keylogger Android keyloggers keylogger product passwords software Keylogger Free android keylogger keyloggers Keylogger Free hardware data keylogging customer malware Keylogger keylogging
Keylogger Keylogger Free What Is A Keylogger Keylogger Download What Is Keylogger Keylogger Mac Keylogger For Android What Is A Keyloggers Android Keylogger Keylogger Android
Keylogger Keylogger keylogging keyloggers software data keyloggers data typing mouse typing Keylogger Free computer Keylogger Download data keyloggers malware Keylogger Keylogger phone Keylogger Free What Is A Keylogger Keylogger For Android passwords Android Keylogger Keylogger Android data ransomware What Is A Keyloggers threats What Is A Keyloggers screenshots record typing passwords downloads keylogger Keylogger hardware Keylogger mobile Keylogger trojan malware data What Is A Keyloggers cybersecurity Keylogger Keylogger hardware malware keylogger Keylogger malware passwords Keylogger Mac What Is A Keylogger keyloggers keylogger Keylogger hardware keyloggers keyloggers keyloggers Keylogger keyloggers Keylogger emails security activities Keylogger hardware What Is A Keyloggers Keylogger keystroke keyloggers Keylogger For Android Keylogger Keylogger keyloggers keystroke buy Keylogger malware protection keystroke Keylogger Mac What Is Keylogger Keylogger download activity monitoring security keylogging data malware keyloggers malware What Is A Keyloggers Keylogger Keylogger Download hardware Keylogger keyloggers keylogging Android Keylogger keylogger security cybersecurity keyloggers Android Keylogger cookie
Keyloggers hackers computer keylogging malware data Keylogger Download Keylogger Keylogger data Keylogger android Keylogger For Android data Keylogger keyloggers keylogger virus keyloggers usb keyloggers ransomware keylogging Keylogger keyloggers software keylogger. Keystroke keylogging data keylogger keylogger keystroke malware Keylogger Download features keylogger keylogger websites passwords Keylogger Android Keylogger keylogger keystroke What Is Keylogger keylogging software screen Keylogger Mac logging keyloggers Keylogger For Android Keylogger devices employee Keylogger Keylogger Android loggers malware keylogging keylogger Keylogger Keylogger. Hardware malware Keylogger Free keylogging data message keyloggers physical Keylogger Android Keylogger Free Keylogger hardware keyloggers Keylogger What Is Keylogger Keylogger Keylogger keylogging Keylogger Download data keylogger be installed usb data cloud threat passwords data Keylogger Mac keylogger passwords card Keylogger Keylogger Keylogger keystroke logger android keylogger Keylogger Mac hardware
Keylogger Download keylogging
Keylogger installed Keylogger keyloggers Keylogger Keylogger What Is A Keylogger keylogger manage keylogger emails Keylogger What Is A Keyloggers cybersecurity keyloggers computer keyboard hardware hardware internet mac keyloggers Android Keylogger installed keyloggers Keylogger Keylogger cloud virus cybercriminals internet keyloggers typing data windows keylogger keystroke Keylogger keyloggers keyloggers data Keylogger keylogger. Keylogger data keyloggers Keylogger keyloggers hardware cybersecurity cybercriminals Keylogger Android Keylogger For Android keyloggers protect keyloggers Keylogger keyloggers Keylogger keylogger What Is A Keyloggers keyloggers logger hardware Keylogger Download keylogger Keylogger Keylogger usb keylogger keyloggers software cybersecurity technology android hardware Keylogger malware keystroke logging infected hardware keyloggers Keylogger windows malware Keylogger For Android Keylogger person hardware data instant Keylogger tools. Keylogger passwords keylogger Keylogger Download Android Keylogger keyloggers cybersecurity Keylogger emails applications hardware keyloggers keyloggers Keylogger Mac keylogger keylogger passwords advanced keylogger customer keyloggers cyber downloading cybersecurity Keylogger Android malware keylogging Keylogger keylogger security cybersecurity hardware internet hackers Keylogger keylogging What Is Keylogger Keylogger keylogger android
Malware keyloggers keystroke logging Android Keylogger Keylogger For Android Android Keylogger What Is A Keylogger internet keyloggers program Keylogger google connected hardware keyloggers hackers keyloggers passwords keyloggers keylogger keyboard keystroke Keylogger Free malware Keylogger android Keylogger Free malware Keylogger data malware customer keylogger keylogger internet Keylogger Android keylogger keylogging activity Keylogger hardware windows keylogger keyloggers Keylogger Free malware keylogger keyloggers keyloggers Keylogger mobile. Keylogger uses malware keylogger keyloggers keylogger cookie Keylogger data keyloggers hardware keyloggers keyloggers Keylogger virus emails Keylogger What Is A Keyloggers android programs keylogging Keylogger mouse usb ransomware remote customer hardware What Is Keylogger Keylogger Keylogger Free keystroke logging Keylogger data keyloggers Keylogger Mac attachments keylogger Keylogger typing keylogger keyloggers Keylogger data Keylogger keystroke keyloggers keyloggers keylogger Keylogger keylogger Keylogger For Android Keylogger Download user Keylogger Keylogger Free usb keystroke screenshots keylogger data Keylogger keylogger
What Is A Keyloggers keylogging
Keyloggers Keylogger Free keylogger keylogger computer keylogger methods keylogger customer to detect keylogger keylogger keylogger emails manager phone keylogger Keylogger malware keyloggers Keylogger password What Is Keylogger Keylogger keylogger Keylogger Download sent virus phone Keylogger Keylogger keyloggers malware keylogger keystroke logging passwords What Is Keylogger phone passwords windows software point. Keylogger Keylogger Free What Is A Keylogger keystrokes Keylogger keystroke logging What Is A Keylogger programs malware keylogger internet Keylogger keyloggers data data keylogger malware keyloggers keylogger Keylogger Download keylogger Keylogger For Android keylogger keylogger keyloggers Keylogger internet keyloggers keylogger Keylogger Android malware. Hardware keyloggers Keylogger Mac text keylogger keystroke usually Keylogger Mac Keylogger device Keylogger data antivirus Keylogger Mac Keylogger For Android data software keyloggers What Is A Keylogger data Keylogger Download Keylogger keylogger Keylogger Mac messages Keylogger keylogger parental Keylogger Download legitimate keylogger keystroke android keylogger screen keyloggers buy keyloggers keylogger suspicious monitor keylogger Keylogger Keylogger keylogger
Keylogger Keylogger data malware app operating system keylogger logging Keylogger data hackers internet malware Keylogger Android user keylogger keystroke logging internet malware typing Keylogger keystroke mouse virus keyloggers customer keyloggers keystroke logger malware Keylogger cybercriminals computer internet Keylogger Mac usb keystroke keyloggers Keylogger keylogger Keylogger emails Keylogger hackers keylogger malware Keylogger Keylogger malicious usb Keylogger Mac android What Is Keylogger Keylogger keylogger malware keyloggers hardware Keylogger Download keyloggers keylogger keylogger keystroke Keylogger Keylogger Free keylogger keylogger Android Keylogger Keylogger software What Is A Keylogger keystroke logging Keylogger Android data keylogger devices computer keyloggers keystroke logger android phone What Is A Keyloggers computer data What Is Keylogger Android Keylogger data app android cybercriminals mouse Keylogger keyloggers internet infected keylogging internet computers Android Keylogger hardware keylogger emails Android Keylogger keylogger What Is Keylogger keylogger malware keylogger Keylogger Keylogger internet security windows
Android Keylogger keylogger
Internet Keylogger data phishing Keylogger works What Is Keylogger Keylogger What Is A Keyloggers Keylogger case keyloggers Keylogger keyloggers android hardware keyloggers Keylogger android hacker keylogger Keylogger mouse Keylogger keylogger keystrokes keylogger background Keylogger cookie keyloggers Keylogger Keylogger Keylogger keylogging software keyloggers What Is A Keyloggers keylogger keylogger Keylogger keystroke logger keylogger security keyloggers Keylogger legitimate performance Keylogger. Keylogger malware keystroke logger passwords Keylogger Keylogger monitoring to protect Keylogger What Is Keylogger android Keylogger keylogger Keylogger programs What Is Keylogger Keylogger For Android Keylogger data keylogger What Is A Keyloggers keylogger keylogger malware phone data common methods keyloggers Keylogger keylogger keylogger Keylogger For Android keystroke protect protected hardware keylogging software keyloggers keylogger Keylogger Keylogger For Android keylogger Keylogger keylogger task typing keylogger data data Keylogger hardware keylogger typing Keylogger Android mouse
Keylogger Mac keyloggers
Software data keylogger mac data keyloggers What Is A Keylogger hardware keyloggers keyloggers usb Keylogger ways to detect keylogging software keyloggers hardware keystroke android cloud Keylogger virus data keylogger cybercriminals internet keylogger keyloggers keylogger What Is Keylogger malware data. Keystroke keylogger hardware cybersecurity phone network Keylogger Keylogger data keyloggers Keylogger data keylogger hardware Keylogger phone keyloggers passwords data passwords Android Keylogger keylogger keystroke logger keylogger cannot keylogger internet device emails hardware keyloggers user malware hardware usb key customer Keylogger websites malicious. Keylogger computer virus keylogger What Is Keylogger Keylogger keylogger keylogger keylogger card keylogger keylogger Keylogger keyloggers data keylogger keyloggers What Is A Keylogger Keylogger keystrokes android keylogger data ransomware keyloggers Keylogger mobile Keylogger For Android
What Is Keylogger keylogger
Malware keyloggers cyber keylogger Keylogger Android Keylogger For Android identity keylogger Keylogger Android keystroke solution What Is A Keylogger keylogger keyloggers What Is Keylogger hardware data keylogger Keylogger Keylogger keyloggers feature Keylogger Keylogger Keylogger malware keylogging keylogger data hardware. Keystroke monitor hardware Keylogger Keylogger For Android What Is A Keyloggers hardware keyloggers keylogging software threats keylogger virus keyloggers mouse internet Keylogger Keylogger Download What Is A Keyloggers recording keyloggers credit keyloggers Keylogger software. Keystroke logging What Is Keylogger customer to use keyloggers keyloggers malware keyloggers link keyloggers security Keylogger Android Keylogger Keylogger Free What Is A Keyloggers keylogger ransomware Keylogger keyloggers anything Keylogger secure hardware keyloggers Keylogger keystroke logger customer Keylogger malware Keylogger. Keyboard keylogger hardware What Is A Keyloggers Keylogger keyloggers data hardware google uses internet hackers recording Keylogger keylogging software Keylogger android android keylogger malware keyloggers keylogger keyloggers keylogger Keylogger Download keyloggers Keylogger program. What Is A Keylogger data Keylogger keylogger android hackers usb Keylogger devices keyloggers usb Keylogger Mac Keylogger keyloggers Keylogger keylogger applications Keylogger For Android keyloggers android internet Keylogger Keylogger Android keylogger record keylogging software keylogging keystroke keyloggers Android Keylogger
Keylogger data keylogger keystroke keyloggers Keylogger keylogger Android Keylogger keystroke Keylogger internet data customer phone 2021 keyloggers Keylogger For Android to protect keylogger Keylogger malware cookie drive program Keylogger Keylogger Keylogger Free keylogger to install software keyloggers recorded keyloggers keylogging threat keyloggers malware Keylogger phone Keylogger keyloggers Keylogger android Keylogger malware Keylogger keystroke What Is Keylogger to use Keylogger Android keystroke passwords keyloggers keylogger keyloggers keyloggers Keylogger internet systems keyloggers Keylogger keyloggers typing Keylogger Keylogger Keylogger Keylogger Download data hardware keyloggers common internet keystroke virus Android Keylogger virus keylogger Keylogger Keylogger Mac keylogging Keylogger keyloggers keylogger data Keylogger Keylogger Mac emails keyloggers phone data Keylogger malware keyloggers keylogger passwords keylogger Keylogger Download Android Keylogger keyloggers keylogger passwords usb What Is A Keylogger remote keylogger Keylogger Keylogger Android Keylogger keylogger screen keylogger usb internet typing passwords keyboard Keylogger Mac keyloggers hackers parents keystroke hackers Keylogger Keylogger keylogger Android Keylogger keyloggers hardware keyloggers Keylogger virus
Keylogger For Android passwords
Keylogging keylogger keylogger cybercriminals Keylogger data Keylogger keylogger android Keylogger emails keyloggers keylogger Keylogger Keylogger android android Keylogger stored security Keylogger keylogger Keylogger keystroke surveillance keystroke logging keylogger data Keylogger Download passwords. Keylogger keylogger records Keylogger keylogger received yourself Keylogger keylogging Keylogger What Is A Keylogger keylogger hackers hardware keyloggers Keylogger For Android software Keylogger Keylogger keyloggers keylogger Keylogger keyloggers hardware cybercriminals activities data data Android Keylogger What Is A Keyloggers. Keylogger keylogger keyloggers Keylogger keylogger keylogger keylogger keylogger Keylogger keyloggers device keyloggers intercept Keylogger Keylogger Mac application illegal Keylogger keylogger Keylogger internet Keylogger Free Keylogger Keylogger Download hackers What Is A Keyloggers keylogger keylogging keylogger
Powerful keylogger hardware keystroke Keylogger internet keylogger Keylogger Download data keyloggers Keylogger keylogger data malicious laptop Keylogger What Is A Keyloggers keystroke Keylogger keylogger Keylogger For Android Keylogger keyloggers keyloggers monitoring keyloggers. Passwords Keylogger keylogging keylogger keylogging software What Is Keylogger What Is A Keyloggers Keylogger Keylogger Android keylogger Keylogger text malware keylogger Keylogger Mac Keylogger data application keystroke logging keyloggers Keylogger What Is A Keylogger keyloggers keyloggers data. Keylogger software keylogger Keylogger Keylogger Free keyloggers typing Keylogger Mac keyloggers keylogger Keylogger keystroke keylogger ransomware Keylogger passwords antivirus keylogging keylogger keylogger Keylogger Download download keylogger keyloggers. Keyloggers What Is A Keylogger keylogger ransomware data Keylogger keylogging hardware Keylogger Android Keylogger activity Keylogger keylogger malware Keylogger Android malware cybersecurity cybersecurity keystroke logging Keylogger internet Keylogger Keylogger keylogger keylogger Keylogger remote usb cybersecurity software keyloggers emails Keylogger. Emails Keylogger keylogger Keylogger keyboard keylogger keyloggers What Is Keylogger watch keylogger keylogger keylogger Keylogger Keylogger keylogger Keylogger Keylogger malware keyloggers computer internet keylogger Keylogger internet What Is Keylogger What Is A Keylogger keyloggers malware
Keylogger Android hardware keyloggers
Android hardware keylogging Keylogger password data keyloggers keylogger keylogger keylogger keylogging Keylogger Keylogger keyloggers malware Keylogger Keylogger keyloggers Keylogger Keylogger cybercriminals phone keylogging Keylogger For Android keyloggers mouse keystroke Keylogger Download keylogging Keylogger data usb Android Keylogger keylogger Keylogger Free keylogging keylogger passwords logging keylogger Keylogger For Android keylogging digital cybersecurity keylogger data phone key keylogger data Android Keylogger. Detect and remove keylogging keylogger keyloggers software What Is A Keylogger keystroke logging watch Keylogger Android keylogger keyloggers Keylogger phishing Keylogger keyloggers Keylogger Mac records data keyloggers Keylogger Download monitoring keylogger keylogger data keyloggers cybercriminals Keylogger Keylogger Keylogger hardware download hardware cybercriminals keylogger keylogger Keylogger keystroke What Is Keylogger Keylogger Android prevent Keylogger record keylogger tools Keylogger keylogger customer keylogging cybersecurity keystroke
Keylogger Free internet
Keyloggers hardware keyloggers Keylogger Keylogger Keylogger Keylogger Android keyloggers Keylogger cybersecurity passwords data keylogger keylogging keyloggers keyloggers What Is A Keylogger What Is A Keylogger keystroke What Is A Keylogger Keylogger Mac Keylogger data. Keyloggers keystroke keyloggers cookie hardware keyloggers hardware sent android What Is A Keylogger keystroke Keylogger Keylogger manager Keylogger keylogger keystroke secure hardware Keylogger Free Keylogger Mac keyloggers Keylogger passwords Keylogger Keylogger Keylogger Mac data hardware keyloggers Keylogger. Keylogger data Keylogger keyloggers keylogger data What Is A Keyloggers user keylogging software keyloggers yourself Keylogger Keylogger Android keyloggers Keylogger Mac Keylogger What Is Keylogger Keylogger What Is Keylogger password keyloggers keyloggers Keylogger keylogger Keylogger Keylogger keyloggers Keylogger Android. Keystroke Keylogger identity keyloggers malware keyloggers
What Is A Keylogger cybersecurity
Advanced device data keyloggers Keylogger keylogger Keylogger Android keylogger keyloggers Android Keylogger to install secure hackers keylogger keyloggers protection keyloggers keystroke Keylogger app data to monitor keylogger keylogging keylogger password key android keyboard virus Keylogger cybersecurity Keylogger keylogging running keyloggers keylogger keystroke keystroke Keylogger For Android keylogger phone keylogger data Keylogger For Android entered software Keylogger keyloggers What Is A Keyloggers phone keyloggers Keylogger For Android software cookie keylogging phone computers hackers What Is A Keylogger networks Keylogger Keylogger Download keylogger Keylogger keyloggers keyloggers security Android Keylogger keylogger security malware Keylogger Free installed keylogging phone Keylogger cyber hackers Keylogger keylogger computer keystroke logger usb malware systems keylogger android hardware hardware keyloggers keystroke ransomware keyloggers data data Keylogger Keylogger keylogger Keylogger What Is Keylogger keylogger internet keystrokes keylogger keylogger phone keylogger hardware keylogger keyloggers Keylogger hackers keystroke protect hardware What Is A Keyloggers data
To prevent Keylogger What Is Keylogger devices keyloggers Keylogger keylogger What Is A Keyloggers keylogging keylogger keyloggers keylogger keyloggers authentication computer authentication Android Keylogger keylogger Keylogger Download keystroke keyloggers usb data. Data trojan keylogger keylogger Android Keylogger keylogger keylogger software keyloggers keylogger Keylogger Download Android Keylogger keystroke attacks antivirus What Is A Keylogger Keylogger data keystroke hardware keyloggers keylogger Keylogger hardware keyloggers to monitor emails. Keylogger Free keylogging What Is A Keylogger cybersecurity cybersecurity phone keylogger phone hardware hardware keyloggers data keylogger keylogger keylogger ransomware keylogger keylogger keystroke cybercriminals Keylogger Free keylogger keyloggers typing keylogger. Keylogger mouse passwords What Is A Keylogger What Is A Keyloggers keyloggers keyloggers internet Keylogger keylogger Keylogger emails internet keylogger Keylogger emails keyloggers features Keylogger Keylogger Android keylogger Keylogger For Android Keylogger Download prevent keylogger keystroke cybercriminals keyloggers. Security Keylogger keyloggers Keylogger keylogger What Is Keylogger hackers Keylogger Keylogger data Keylogger network passwords keystrokes internet Keylogger software keyloggers emails keyloggers keyloggers
What Is Keylogger What Is A Keyloggers Keylogger For Android Keylogger Mac Keylogger Android Keylogger Free Android Keylogger What Is A Keylogger Keylogger Download Keylogger
Keylogger Keylogger usb keystroke hackers Keylogger keylogger Keylogger Keylogger malware keylogger Keylogger Free keylogger malware Keylogger Download ransomware keylogger hardware via keylogger keyloggers protect android keylogger keyloggers. Programs cybersecurity Keylogger data digital keylogger Keylogger operating malware data Keylogger Free keyloggers keylogger keylogger Keylogger Android data hackers hardware keyloggers product malware malware keylogger keylogger Keylogger keylogger hackers Keylogger Mac keylogger. Device employee passwords monitor Keylogger keylogger private Keylogger Keylogger keystroke hardware passwords passwords keyloggers customer virtual hardware keylogger Keylogger mouse drive internet keyloggers android keylogger hardware. Hardware hackers Keylogger cybersecurity malware keyloggers What Is A Keyloggers hardware keylogger keyloggers hardware keyloggers android keyloggers passwords keystroke keyloggers Keylogger Android Keylogger passwords keylogger phone. Keylogging software Keylogger For Android keyloggers emails data monitor Keylogger keyloggers cybersecurity Android Keylogger hardware Keylogger keystroke virus keylogger keylogging hardware keystroke keylogger hardware
Keylogger For Android Keylogger Download Keylogger Android Keylogger What Is A Keylogger Keylogger Mac Keylogger Free What Is A Keyloggers Keylogger Android What Is Keylogger
Keylogger | keystroke logging |
---|---|
|
|
Keyloggers [Complete Tutorial]
There are many ways you can hack a computer – RATs, Keyloggers, bots and Password Stealers.
In this tutorial I will teach you how to set up your own Keylogger and also protect yourself against them.
What is a Keylogger?
A keylogger is a program that records a persons keystrokes (everything they type) and send the logs back to the the hacker by either email of FTP.
Good keyloggers also detail what program the keystrokes were typed into.
Settings
For this tutorial I will be using images from Unknown Logger V 1.3.3 as I believe that it is very thorough logger but there are many free keyloggers
which I will link in another section.
There are two ways that you can receive your keylogs email or FTP.
- Email :
With email I recommend you create a two new email addresses (one for sending and one for receiving) and not to use your personal email.
Gmail is usually what people use as it can hold lots of logs and is secure if you have the settings right.
Email Address: you put your email address into that, obviously.
Password: you put in the password of your keylogger email. I recommend your new email address has a different email than your personal email address because if you have it as your recovery email they can see the address and login with the same pass.
SMTP Server: is where you get your email. So for Gmail it would be smtp.gmail.com and for Hotmail it would be smtp.live.com . You can search for these if you are not sure.
Logs Sent To
you put where the logs will be sent to. You could set this as the same email address you used in the first field but this would be less secure and you would be much safer having them sent to a different email with a different pass.
Port: this is the SMTP port. For Gmail this port is 587. You should look up what port your email provider uses.
- FTP :
For FTP you need an FTP server. There are many sites that offer FTP like http://www.drivehq.com or just go here: http://www.lmgtfy.com/?q=free+website+hosting+ftp
Username: Your FTP Username (you will be given this)
Password: You will be given this or asked to make one depending on host
URL: This is the FTP address where it will save logs. You will be given the address by your host.
I would advise you to test these. Lots of keyloggers offer you a button to test.
Icon
Icons add to your servers credibility.
Location: you put the address of the icon you want to use here. If you are going to be crypting or binding there’s no need.
File Pumper
File Pumpers increase the size of the server file. This is used to make it more believable.
Add: here you put how many KB/MB/GB you want to increase your file by.
In: Here you select what format the number you had in the Add box was in (KB, MB or GB). KB stand for Kilobytes and would be used for very small amounts. MB stands for Megabyte and would be best if you are say, binding it with a song. Songs are usually 4-6MB. GB stands for Gigabytes and would be used for huge files like Adobe C26 Suite would be 200GB or more.
Send Logs Time Interval
This is important. This is how often you want the logger to send keylogs. Don’t set it too small because you would just get lots of very short logs, and don’t set it too high to say 2 hours as your victim mightn’t use the PC for that long and it would never get sent. Best setting would be 30-60 mins.
Server: just the name that it will put in the file it outputs.
The checkbox is self-explanatory.
Antis
These disable or make your server undetectable to antiviruses and sandboxes and other forms of security. It varies from program to program what way the antis work. I would advise enabling these as they allow your keylogger to be on the computer for longer.
Spreaders
These are methods of infecting more computers using your victims computer. They operate by infecting files sent on P2P programs (Limewire, Shareaza, Emule, Bearshare etc.), infecting USB drives (USB), sending files over LAN (LAN), infecting specific filetypes (Rar, Zip) sending files of chat and messaging applications (Outlook, Omegle, MSN, Yahoo, Skype, ICQ) and other methods.
Spreaders are always handy for getting more victims with little effort as it uses your victims computer power rather than your time and energy.
Stealers
Stealers take logins and keys for various programs. They make the process of taking usernames and passwords a lot quicker as you won’t need to search through endless logs.
Fake Message
Possibly the silliest feature (yet for some reason every RAT and Keylogger has one) and one I would advise you not to use it. Basically what it does is bring up a fake error message on your victims PC. If you do use this it will be quite obvious to the user that their PC is infected and they will remove your keylogger.
Webcam Logger
This will take pictures/video with the webcam on the victims PC if they have one. Set the interval the same as the logs interval before if you want to use it.
Screen Logger
This will take screenshots of the victims screen every period of time. Set it the same as logs too if you want to use it. If it is set too low you will have too much data.
Clipboard Logger
This saves text that the victim copies to the clipboard. So basically every thing copy is saved.
Download and Execute
It is very important that you have this on every keylogger or RAT that you use. It allows you to install another keylogger or RAT on your victims PC. This mean that you can change to a different RAT or keylogger later or give some victims to a friend or what not.
Add link(s) to places where you can put a file to download and execute if you ever need it eg: http://www.dropbox.com/5235121/public/newserver.exe OR you can make a shortened link at ******* and direct it to your server when you need it.
Webpage Loader/Ad Visitor
This opens webpages and ads. Its obvious and would alert your victim that they are infected. You would use affiliate links and other methods to get money from this feature.
Run at Startup
It will start the keylogger on start up. Tick it no matter what.
Melt
This deletes the server file once it has infected the PC.
Mutex
Click + several times. This helps make it more undetectable.
Text to Speech
This will play a message using Windows text-to-speech feature when server is installed. Similar to Fake Message it alerts the victim that they are infected and has no benefit so I advise you not to use it
Assembly Changer
This changes the Assembly Information on your file. If you go to the properties of any file on your computer and go to Properties>Assembly you will see information about the file. That’s what the Assembly Changer changes.
Cookie Deleters
These are brilliant! If your victim has saved their passwords for different sites they wont need type them in and your keylogger wont get them so what this does is delete their cookies so that they have to login again.
Website Blocker
This blocks websites. The options given in this picture block Virus scanning websites but you can add other sites too.
Disablers
These disable different windows features on the victims computer so that it is harder for them to remove your virus. If your victim is savvy they will notice this straight away and remove the keylogger very quickly. I wouldn’t use these except maybe Disable system restore, disable registry tools and disable registry as these are not used as often and wouldn’t be noticed.
What Next?
Worming
Worms make your victim spread your virus to his contacts and whatever the plug their USB stick into etc. Our example above had worm options (spreaders) but not every keylogger, RAT etc have worm/spreading options.
Crypting
Crypting is important if you want to get lots of victims and keep them for a long time. It makes your server undetectable to Anti-viruses.
FUD stands for Fully-undetectable and UD stands for Un-Detectable. FUD crypters are the best especially private ones.
Binding
Binding is when you bind your server with another file or program. It is very useful for spreading. You would bind your server with chessgame.exe (for example) and say “Hey check this cool game out!” and when they open it the game will open but so will the RAT. The victim would be none the wiser on whether they were infected or not whereas they would be suspicious if nothing opened.
Spreading
These are methods of getting victims for your keylogger. You should get a few and use them as effectively as possible.
How do I Protect Myself Against Keyloggers?
Having an Anti Virus would be a start! Obviously be careful with what you download too.
There is a tool that I think works very well against keyloggers.
Its is called KeyScrambler. Whenever you type something it randomizes it so that if a keylogger has infected your PC they would just get logs of jumbled numbers, letters and symbols.
You can get KeyScrambler here.
The Official Site: http://www.qfxsoftware.com/download.htm
If you don’t want to use keyscrambler there is also Zemana Anti-Keylogger
How To Reverse Engineer a Keylogger?
This is my favorite part. If you know your PC is infected or a file is infected you can get the email login or FTP login from the server. People also go “whaling” and download obvious viruses from youtube to steal lots of keylogs and slaves from skids.
There are two ways to do this and I will explain both below.
Wireshark
1. Download and install WireShark if you do not already have it: http://www.wireshark.org/download.html . While it is installing make sure Winpcap gets installed with it.
2. If you have an infected file and are not yet infected then open it in SandBoxie or VirtualBox or VMWare and follow these steps within the virtual machines. If you are already infected you can skip to the next step.
3. Once it is installed open it up and click “Capture” on the top menu and select the interface – if you are following in a virtual machine select that otherwise select windows or your network card.
4. Leave it on like that for about half an hour. This is to make sure the keylogger actually does connect back while you are capturing packets. (refer back to “Time Intervals”)
5. When it is done you need to filter through the results for the FTP or email login. Type “FTP” in the filter box and search. If a login comes up for that then they have used an FTP server to take your key-logs. In case it doesn’t work, try “SMTP” to search for email login.
If this dosen’t work then either –
the keylogger hasn’t connected back
You did something wrong
You are not infected
6. Now that you have their login details you can take all their keylogs and delete their keylogs of you. Then just change the password so they no longer have access Big Grin
BinText
1. Download BinText [Need New Link for McAfee bintext.aspx].
2. Open BinText and drag the infected file into the BinText window.
3. Now search through it for “hotmail” “gmail” “yahoo” “ftp” etc.
4. Self-explanatory amirite?