How To Create Keylogger And Hack Every Single Password From A PC

What do we need?
  1. Vulcan logger
  2. A new e-mail 0address specifically for keylogging
 How To Create Keylogger?
  • Download the program from here, open it up and you should see the builder. Input your email username & password into the boxes. The reason we are doing this is because the keylogger will log into your email, then email yourself the logs. I recommend making a new email specifically for keylogging.

  • Select what email provider you are using here. If you are using gmail, select the first provider, if you are using yahoo, select the second provider, if you are using hotmail or live, select the third option.
  • Input the subject of the message you will receive every time you receive a keylog. Most people put “Facebook Logger” or something similar.
  • I recommend checking both of these boxes. The computer info will send the slave’s IP address and their computer name. The screenshot will send a picture of the slave’s screen whenever the log was sent.
  • This is the time in between the logs. I usually recommend 5-15 minutes.
  • At this point I suggest you click Test Email and make sure everything is working fine.
  • This is what the Icon of the output file will be. It will ONLY take in .ico’s. If you do not have any, I suggest either downloading them online, or creating your own.

  • Click the Extra Options Tab at the top of the builder.
  • The add to startup option will make the slave file go on startup on the slave’s computer, so whenever he reboots his computer, he will become keylogged again. The melt option will make the file go hidden when it is first run. I usually recommend that you check both of them.
  • This option will allow you to display an error message when the file is first run by the slave. Here I used “Error Windows Can Crash” as title and “Your Antivirus Is Blocking Windows Process Pleas Turn Off Your AV” the Type should be “Error”.
  • The Use Downloader function will download and execute a file on the first run of the slave file. You can do this if you want it to execute many different viruses, its a better alternative to binding. Make sure you put a direct link to the file. [Not For Regular Users Or Newbies]
    The Website Visitor function will automatically visit the website on run. It will pop up in the default web browser.

  • I strongly recommend that you check “Add To Startup” And “Melt” functions. They will decrease the detection rate and make your logger more secure from whalers. I also recommend that you click Generate Key a few times to get a unique key. This is generating an encryption key to keep all of your information secure.

  • Now click on the Assembly & Build Tab.
  • Fill your info into it.
  • The file pumper will increase the size of the output file. You should keep this at 0 unless you want to increase the size of your slave file.
  • Change the File Name to whatever you want, for example you can change it to “HAcker”.

  • Now click build. Wait a bit.

Note:
Now get your build file and send it to your victims and get all information out of their computer. Use some attractive methods to persuade them to use your keylogger and anyhow jut make them run it once.
Previous
Next Post »

1 comments:

Click here for comments
Unknown
admin
19 January 2017 at 00:43 ×

Thanks for the info, but I already bought keylogger software here https://www.refog.com/mac-keylogger/. And this is a very easy to use program. I installed it on a computer and now I know about all the information that I need.

Congrats bro Unknown you got PERTAMAX...! hehehehe...
Reply
avatar