Jump to content

[Updated: 5/10/2010] Keylogger (full guide)


Recommended Posts

Posted

Topic updated on 5/10/2010 (crypter added)

 

 

Hi guys..

I searched around the forum for keylogger guides but I found nothing. I found "how to build a keylogger" topics but not a full guide. I am going to show you the full task of how to use a keylogger.

Ok I won't waste your time anymore. Let's start..

 

First you have to download some programs...

 

 

Emissary Keylogger

http://rapidshare.com/files/422310671/Emissary_Keylogger.rar

 

Napsterakos Binder

http://rapidshare.com/files/422311075/Napsterakos_Binder.rar

 

CorruptD Heaven Crypter

http://rapidshare.com/files/423242860/Crypter.rar

 

Icon Changer v3 (Not nessesary)

http://rapidshare.com/files/422311204/Icon_Changer_v3.rar

 

Fake Progs (Not nessesary)

http://rapidshare.com/files/422311242/Fake_Progs.rar

 

 

 

GUIDE

 

 

Build the server

Go to http://www.gmail.com/ and create an e-mail account or just use your own. You will get the victim's information by e-mail. Open "Emissary.exe" and type your gmail account. Then type the name of your server or leave it as it is "server.exe" (it must be .exe). "Interval" is the minutes the server waits before it sends you the information (if you type 5 it will send you an e-mail every 5 minutes). Now check the boxes "Add to startup" and "Antis", you can also check the other boxes or uncheck them, you choose. If you want you can add a fake error message but I do not recommend it. Now click on "Build" and you are done.

 

Bind the server

Binding is when you hide a program in another program. The two programs will run the same time but only one will be visible. You need to bind the server so the victim will open it and they will not understand it is a keylogger. Open "Napsterakos Binder.exe". Click on "Add File" at the "Primary File" line and choose the server. Then click on "Add File" at the "Secondary File" line and choose a program (choose a portable program, an installer, an image, a video etc.). Then click "Bind" and you are done. The binded file will be ".exe".

 

Crypt the server

Once you have binded the server you have to crypt it to avoid antivirus detection. Open "CorruptD Heaven Crypter.exe". Click on first "Browse" button and choose the binded file. Click on the second "Browse" button and choose "CarlsJR" from the "Crypter" folder. You can also check "Enable Icon Changer" to choose the icon of the crypted file or you can download "Icon Changer v3" which I share with you in this topic, you choose. Click on "Crypt" and you are done.

 

Icon Changer v3 (Not nessesary)

The crypted file will have an icon you should change if you want to. Open "Icon Changer v3.exe". Click on "Browse File" and choose the crypted file. Then you either choose "Choose Icon" to choose an icon from the program (not recommended) or "Browse Icon" to choose an icon from your computer. Now click on "Change Icon" and you are done.

 

Fake Progs (Not nessesary)

Fake Progs are, as the name says, fake programs which you can use to bind the server with. They do not work but you can tell the victim that you found some hacking programs and if they want to try them. When they run the fake program the server will run secretly and they will only see the program. Open one of those programs just to see how they look like. I repeat that they do not work.

 

 

!ATTENTION!

1) The crypted file is detected only by Avira Antivir.

2) You must disable your antivirus to work with the programs because it detects them as a virus.

 

 

Programs' photos

Emissary Keylogger --> http://img814.imageshack.us/img814/9443/emissary.png

Napsterakos Binder --> http://img199.imageshack.us/img199/1034/binderx.png

CorruptD Heaven Crypter --> http://img214.imageshack.us/img214/3669/90105012.png

Icon Changer v3 --> http://img96.imageshack.us/img96/6111/iconbe.png

 

Crypted Server Detection

File Info

 

Report date: 2010-10-05 14:33:44 (GMT 1)

File name: crypted-server-exe

File size: 5015040 bytes

MD5 Hash: 183a8b175350fb0b1d1f7b61fded327a

SHA1 Hash: 6091079af3028851a7e471fd82c7c91e65373b84

Detection rate: 1 on 16 (6%)

Status: INFECTED

 

Detections

 

a-squared -

Avast -

AVG -

Avira AntiVir - TR/ATRAPS.Gen

BitDefender -

ClamAV -

Comodo -

Dr.Web -

F-PROT6 -

Ikarus T3 -

Kaspersky -

NOD32 -

Panda -

TrendMicro -

VBA32 -

VirusBuster -

 

Scan report generated by

NoVirusThanks.org

 

 

[The guide is created by me. The programs were found on forums by me. For any question or explanation, please, post. Inform me if links expired or crypted server is getting detected by more antiviruses.]

Posted

you should add a fud crypter guide aswell

 

see the scan results of the binded file.. it's 2/16.. it's fud by binding

i searched for cryptes but they had higher detection level.. so you don't need crypter

Posted

very usefull i needed the binder cause  had one that was only for trial.

 

trial binder? wtf.. all the binders I have found are free..

 

//OnTopic

 

I will also upload a crypter (as you asked).. now the detection will be 1/16

Posted

Cool, now more mxc braindamaged members will lose their accs! :D

Good guide tho.

 

I don't think that an MxC member will try to steal the pass of another member.. and if so.. the real member can pm Maxtor ;)

 

yes

 

Can't you understand english? it's not something difficult

Posted

I dont get sth...

I followed every single step of ur guide, but I cant get how it's gonna work...

I mean, what I am supposed to do, in order to make the victim type his account ? (for example in a L2 server ?)

And how it's gonna be send to my gmail ?

TY :)

Posted

I dont get sth...

I followed every single step of ur guide, but I cant get how it's gonna work...

I mean, what I am supposed to do, in order to make the victim type his account ? (for example in a L2 server ?)

And how it's gonna be send to my gmail ?

TY :)

 

you don't make the victim to type his account..

you just send him the server (binded file) and when he runs it the server will send you whatever he does to the pc and whatever he types. if he press "asadsa" buttons you will get "asadsa" to the email. the server will send you what programs he runs and what he types when he uses the programs.. you will see something like that: L2.exe id password

it depends on how he writes it.. if he uses tab to switch between id and password bar you will see

 

l2.exe

id[TAB]password

 

if you still can't understand I will post a photo..

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now



  • Posts

    • in conclusion when somebody who has a project for 10+ years still on development writes an e-say to try until you succeed and then advertises his project, one of the reasons is he needs money, so l2j has once more become pure expensive hobby, you wont make money out of it.   You can still use L2jFrozen and get better results for this, i know some people that done it    keep in mind that C in aCis stands for Crappy, and after all these years its not a cool wordplay anymore, its a fact, prove me wrong.
    • First, don't really follow the "main voice", moreover if you consider it an hobby. Simply do what you want, you got only one life so use it as you want. If you make it an hobby, it's exactly like piano, or velo - only practice makes you better.   Secondly, how do you learn things ? It's actually a really important question, since some can simply be scholar, read books (theory) then practice ; and some simply can't read books. I'm the second type, I hated school, I find it boring - my knowledge in Java comes from try-and-fail. You improve your coding style every year or so, I can myself rewrite my own code (which I already considered top-notched) after a while. You always learn something new - even if Java barely evolves. L2J is a fun way to learn programming, it's a giant sandbox where you can edit anything, and I believe it should be taken as it.   My own way of learning was as follow : Add existing customs, no matter what they are : the point is to know main classes used by L2J / customs. L2J is barely Java knowledge ; the true knowledge is to know WHAT to search in WHICH location (what I call, organization). You have to understand than EVERYTHING you think already exists, in a form on another, in the source code. A custom is only the association of the different mechanisms you found "here and there", glued together in a proper goal. Once you know main classes to edit, and the customs you added are compiling fine, the main point is to know WHAT exactly you DID. Try to understand WHY and WHERE you actually copied the code. Third point would be to MANIPULATE the customs you added in order to fit your wish. First edit little values, then logic conditions ; eventually add a new Config, or a new functionality to the custom. Fourth point would be to begin to craft your own ideas. Once again, EVERYTHING already exists, in a form or another. You want a cycled event ? You got Seven Signs main task as exemple. Npc ? Search any type of Npc and figure out what it does. Fifth point would be to understand Java - mostly containers (WHAT and WHERE to use them), variables types and main Java mechanisms (inheritance, static modifier, etc). You should also begin to cut your code into maintainable classes or methods. Java can actually run without optimization, but bigger your ideas, more optimized and well-thought it should be. It's direct saved time in the future, and you would thank yourself doing so. Main tips : ALWAYS use any type of versioning system - GIT or SVN. It allows to save your work, step by step and eventually revert back anytime you want if you terribly messed up. L2J is 80% organization knowledge, and 20% Java knowledge. Basically, if you know WHAT and WHERE to search, if you aren't dumb, it's easy to replicate and re-use things. Cherry on top is to use a already good coded pack to avoid copy-paste crap and get bad habits. Avoid any type of russian or brazilian packs, for exemple - their best ability is to leak someone's else code. Obviously you need some default sense of logic, but Java and programming in general help you to improve it.   Finally, most of your questions could be solved joining related Discord (at least for aCis, I can't speak for others) - from the moment your question was correctly asked (and you seemed to search for the answer). My community (and myself) welcomes newbies, but got some issues with noobies.   The simpliest is to try, fail and repeat until you succeed - it sounds stupid, but that's basically how life works.   PS : about Java ressources, before ChatGPT, it was mostly about stackoverflow website, and site like Baeldung's one. With ChatGPT and alike, you generally double-cross AI output to avoid fucked up answers. Also, care about AI, they are often hallucinating really hard, even today. They can give you complete wrong answer, you tell them they are wrong, and they say "indeed, I suck, sorry - here's a new fucked up answer". You shouldn't 100% rely over AI answer, even if that can give sometimes legit answers, full code or just skeletons of ideas.   PPS : I don't think there are reliable ressources regarding L2J itself, also most of the proposed code decays pretty fast if the source code is actually maintained (at least for aCis). Still, old coded customs for old aCis sources are actually a good beginner challenge to apply on latest source.
    • WTS: - AQ - Baium - Zaken  - Frintezza - Vesper Fighter Focus Fire Element   pm for detalis
  • Topics

×
×
  • Create New...

AdBlock Extension Detected!

Our website is made possible by displaying online advertisements to our members.

Please disable AdBlock browser extension first, to be able to use our community.

I've Disabled AdBlock