Java Based Remote Keylogger : Best Facebook Hacker

222 views 20 Comments
Hello Friends, today i am going to introduce you another java based remote keylogger. It’s a perfect and best Facebook hacker tool. Since today the technology has advanced to next generation, now its become quite easy to hack the email accounts, Facebook remotely. Most of us are nowadays are interested in hack tools that works remotely i.e. you don’t have the direct physical access to the system. Remote keylogger is a hack tool that records the key strokes of any user anonymously and send the logged records either to a SMTP email client or FTP client.

Note: This is for Educational purposes only. Please read Disclosure before using this tool.

Features of Java Based Remote Keylogger : Best Facebook Hacker Tool (IStealKeys 2.0)
  • 100% FUD from all anti-virus
  • Send Logs To Emails ( gmail,yahoo,aol,hotmail ) and Ftp account
  • Decreased Server Size
  • Optimized Memory UsageIcon Changer
  • Time Setter
  • Melt server after using
  • Start up adder
  • Became active after every start up of windows
  • And many other features
How to use this Keylogger?

1. Download the keylogger and Extract the files.
2. Now Enter the Details of fake gmail account that you have to create to use it.(for security reasons)
3. Now Set the timer to receive logs to your email address.
4. Now click on send verification to check whether the Keylogger is working correctly or not.
5. Now Go to mutex text column. There type anything waste (note try to include as many as special characters as possible and atleast 70 to 80 characters). Don’t click on Generate.
6. Now click on Compile Server to Create the Keylogger. It will ask you to save the file. Select desktop to save the file and name it whatever you want.

Now you have keylogger’s server created. Now for binding and make it undetectable and spreading it online then  visit to this post:

For other technique visit the post: CLICK HERE
Note: You will need latest JRE(java run time environment) and .NET framework to run it properly(.NET framework 4.0).
If you have any queries ask me…  Enjoy and have Happy hacking.
Author Bio

Lokesh Singh

Hey Friends, This is Lokesh Singh. Your friend, who loves to share knowledge with friends as i believe in "Sharing is Caring". If you like our tutorials then you can send your gratitude by saying thanks or clicking any of our Sponsor ads.

  1. ultra

    January 5, 2011 at 12:52 am

    send the logged records either to a SMTP email client or FTP client.

    Im confused abt that what r amtp mail and FTP client………..
    plz explain about that……………
    share ur that knowdge :p
    so i can do that..

  2. ultra

    January 5, 2011 at 12:52 am

    thax for all of ur posts
    and sharing us :)

  3. Bulk SMS Reseller

    January 5, 2011 at 8:22 am

    Great post! I start my blog 2 months ago and this is really helpful for me and I’m newbies on the road…. Thank you…

  4. Anonymous

    January 5, 2011 at 8:37 am

    sir i want to know working process in details..for this keylogger

  5. Anonymous

    January 5, 2011 at 10:21 am

    Dear Lokesh, i truly appreciate ur help. I tried binder it showed msg ‘files binded’ but didnt save anything on desktop, which was output folder. Dont know what went wrong.

    Secondly, once reshacker file is opened as u explained in point 2 , just opening any setup file and clicking save all resources , i mean will it make Keylogger FUD coz till now keylogger is yet not attached to setup file ? :)

    - Sid

  6. M/Y some kindda creations here. bijay

    January 5, 2011 at 1:21 pm

    fo LOKESH :

  7. Anonymous

    January 5, 2011 at 3:07 pm

    Unable to save the builder server on desktop , showing (unexpected handled error)

  8. Lokesh Singh

    January 5, 2011 at 3:40 pm

    My Email contact address is
    and another one is

    Feel free to contact me for any queries…Enjoy and have happy learning..

  9. Lokesh Singh

    January 5, 2011 at 3:51 pm

    @ Ultra

    Gmail ask for sms verification when you try to create email ID which already exist or you have choosed it from suggestions. If you try to create an ID which is very unusual it will not ask sms verfication…

    Also my brother you can use same mobile number to verify 50 gmail accounts.. So don’t worry…Enjoy and have fun… Also try to use thunderbird client and daily copy all the mails in thiunderbird and delete them from gmail….

  10. ultra

    January 6, 2011 at 1:03 am

    but if we varify fake account on google then if we cought in hacking it????
    they can catch us easily by the number used to varify
    thats why m askin….but ill try ur trick of unusual names thx…:)

  11. Anonymous

    January 6, 2011 at 6:22 am

    Thanx Lokesh :)


  12. Anonymous

    January 7, 2011 at 1:51 pm

    someone help pls. i have install it in my own pc.
    how to remove it.:-(

  13. ultra

    January 7, 2011 at 7:26 pm

    thx lokesh

  14. Teksi Kita

    January 8, 2011 at 7:48 am


  15. Lokesh@Admin

    January 8, 2011 at 11:15 am

    Lol I know How to hack gmail and facebook… because i am addicted to hacking and exploring..:P

  16. Anonymous

    January 8, 2011 at 4:03 pm

    plzzzz plzzzzzz help me

    i m having the prblm of
    unhandled exception occured in your system

    plzz help me how to fix it…

  17. Anonymous

    January 8, 2011 at 4:05 pm

    admin plzzz plzzz help me to fix thix problem i mentioned above….

  18. Anonymous

    January 8, 2011 at 7:45 pm

    plzz explain how to handle if i installed it on my system only.plzzzzzz:(

  19. Anonymous

    January 16, 2011 at 4:02 am

    Is the keylogger suppose to function at boot once it’s been executed? All of the PC’s I have attempted this on never re-execute after booting.

  20. Anonymous

    January 16, 2011 at 4:03 am

    P.S. .net and JRE are both fully updated.

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>