Sunday, July 29, 2012

Ardamax Keylogger


With serial

Ardamax Keylogger is a keystroke recorder for monitoring EVERYTHING people type on the computer. In total stealth, the program records keystrokes made in all applications Microsoft Word, Outlook Express, Skype, Internet Explorer and anywhere else, makes snapshots of the screen and saves captured information to an encrypted log file. The log file has a time stamp and the name of the application where the keystrokes have been captured. You can view the log in the built-in Log Viewer, or have it sent to you by email, via LAN, or get it uploaded to the FTP server.


The program leaves no traces of its presence and cannot be discovered by the computer system. Other users do not suspect they are being monitored and cannot see the program in Windows processes, even with advanced process viewers. The program can be accessed by the user who knows a valid access password.


Ardamax Keylogger runs on Windows 2000, XP, 2003, Vista.


Top Reasons to Install Ardamax Keylogger



Choose Ardamax Keylogger and enjoy these exciting features and benefits:


Check on children's activities

As a loving parent, you can use Ardamax Keylogger to protect your children from unwanted acquaintances, pedophiles, thieves, porn sites, and other online smut. Whether youƃ¢Ć¢‚¬Ć¢„¢re at home or work, you always be in control of your child with log reports delivered right to your desktop.




Keep tabs on your significant other

If your beloved does not allow you to come close to the computer and closes all windows when you come into the room, you can use Ardamax Keylogger to find out whats going on. Check whether your significant other is having a secret affair with someone in MySpace or Facebook. Save your relations before its too late!




Save lost typing
Ardamax Keylogger makes a good backup solution for most anyone who types documents. Use it to record your typing and restore documents you have lost due to unintentional deletion, or software crash. Ardamax Keylogger will save you time as you wont have to re-type lost text from scratch.




Monitor employee performance
As an employer, you are interested in discipline and maximum productivity in the office. Using Ardamax Keylogger, you get regular reports on what going on in the office when you are not around  whether your employees work or waste working hours chatting with friends or hanging around on fun sites.




Capture keystrokes, snapshots, clipboard
Ardamax Keylogger records keystrokes in all applications, including both sides of the conversation in instant messengers, such as MSN, ICQ, Skype, Windows Messenger, Google Talk, Yahoo Messenger, Miranda, and QIP. More than that, it records passwords, clipboard content, and makes screenshots of the desktop.




Remote delivery of logs via email, LAN, FTP
All recorded keystrokes and snapshots can be viewed locally or remotely. If you opt for the latter option, you be able to use three delivery methods email, FTP, LAN. You can have all logs sent to your email address, uploaded to the FTP server, or sent to you via local network at set intervals of time.




Absolute stealth
With Ardamax Keylogger, there no chance for the program to be detected. In the invisible mode, it hides its presence everywhere  in the task bar, system tray, Windows 2000/XP/2003/Vista Task Manager, process viewers (Process Explorer, WinTasks), Start Menu and Windows Startup list.




Total security
For more peace of mind, Ardamax Keylogger allows you to set up a password to protect program settings, Hidden Mode and log file. No one, except you, will be able to access Ardamax Keylogger.




Unicode support
Ardamax Keylogger supports Unicode characters, which makes it possible to record keystrokes that include characters from Japanese, Chinese, Arabic and many other character sets..

Vulcan Logger



Vulcan Logger is a monitoring software that records all keystrokes on a computer. It then securely emails the strokes to a email set by the user. This software is for educational purposes only.
Features:
[x] Completely Undetectable(FUD)
[x] Choose SMTP/Port
[x] Choose the Subject of the Email
[x] Send Computer Information
[x] Send Screenshots
[x] Set Interval of emails
[x] Test E-Mail
[x] Choose the Icon
[x] Add to Startup
[x] Melt
[x] Display Error on Run
[x] Choose title/message/type of error
[x] Download on Execute
[x] Website Visitor on Execute
[x] Random variable and function names
[x] Generate strong encryption key
[x] Generate random Assembly
[x] File Pumper
[x] Choose File Name
[x] 27KB output.
Step 1: The Email
After you downloaded the program, open it up and you should see the builder. Input YOUR email username & password into the boxes. The reason we are doing this is because the keylogger will log INTO your email, then email yourself the logs. I recommend making a new email specifically for keylogging. 
Select what email provider you are using here. If you are using gmail, select the first provider, if you are using yahoo, select the second provider, if you are using hotmail or live, select the third option.
Input the subject of the message you will receive every time you receive a keylog. Most people put "Runescape Logger" or something similar.
I recommend checking both of these boxes. The computer info will send the slave's IP address and their computer name. The screenshot will send a picture of the slave's screen whenever the log was sent.
This is the time in between the logs. I usually recommend 5-15 minutes. 
At this point I suggest you click Test Email and make sure everything is working fine.
Step 2: The Icon
This is what the Icon of the output file will be. It will ONLY take in .ico's.
Some anti-viruses will detect an icon if it has been used before for malware, so I recommend getting some more obscure icons that have not been used before. After you locate the .ico it should appear in the box located to the right of the browse button.
Step 3: Options
Click the Extra Options Tab at the top of the builder.
The add to startup option will make the slave file go on startup on the slave's computer, so whenever he reboots his computer, he will become keylogged again. The melt option will make the file go hidden when it is first run. I usually recommend that you check both of them.

This option will allow you to display an error message when the file is first run by the slave. Common messages are "This file is not compatible with your computer."
The Use Downloader function will download and execute a file on the first run of the slave file. You can do this if you want it to execute many different viruses, its a better alternative to binding. Make sure you put a direct link to the file.
The Website Visitor function will automatically visit the website on run. It will pop up in the default web browser.
I strongly recommend that you check both of these functions. They will decrease the detection rate and make your logger more secure from whalers. I also recommend that you click Generate Key a few times to get a unique key. This is generating an encryption key to keep all of your information secure.
Now click on the Assembly & Build Tab.
Click the "Randomly Generate" button. Now you can change the assembly to whatever you want it to say. For example, if you want to disguise this as a runescape product, you should change the company to "Jagex LTD." and the Product to "Runescape" and the Copyright to "Jagex LTD. All Rights Reserved". I do not suggest changing the version and File Version.
This is a file pumper, it will increase the size of the output file. You should keep this at 0 unless you want to increase the size of your slave file.
Step 5: Build
Change the File Name to whatever you are disguising the file as, for example you can change it to "Runescape Pin Generator". Now click build. Wait a bit and it should give you the following message:
All you have to do now is go to the folder where your builder is located and you should notice your slave file. You can send it to all your friends now! Remember, to tell which anti-viruses detect your file ONLY use elementscanner.com. Do not use ANY other site.

Project Neptune

Project Neptune includes many features that separate it from similar programs and simply make it the best - and no, these features and functions aren't half-way coded, dinky scripts. Each of these functions are entirely custom coded and heavily tested. These features are listed below, and are in accordance to the screenshots of the tabs above. Keep in mind that Premium features are excluded and there's more on those after this section.
Tab One/General Functionality 
[+] Easy to understand, comprehensive GUI, complete with tooltips to guide you along.
[+] Obfuscated variables and other vital settings. Uses custom random keys, Greek orientated. View a screenshot here.
[+] Entirely stable and functioning keylogger with constant support and updates.
[+] Ability to send logs to FTP (only on Premium) and/or email. Complete functionality in both with simple, easy to understand log formats.
[+] Logs all keys on an English keyboard using sophisticated, custom coded keyboard hooks.
[+] Vital program processes are multithreaded to increase maximum stability.
[+] Completely customizable logs and log intervals.
[+] Customizable backspace recording, clipboard recording, and shift/caps lock recording.
[+] Ability to record system specs, including Windows key, OS version, and more.


Tab Two 
[+] Ability to disable Windows Task Manager through 3 different methods, each with shown levels of suspicion.
[+] Ability to disable the Windows Registry Editing tool.
[+] Ability to disable Windows DOS/Command Prompt.
[+] Ability to disable the Windows Vista/7 User Account Control.


Tab Three 
[+] Two separate add to startup methods, each with varying levels of security needed.
[+] Five dynamic installation locations (meaning they change with each computer to ensure the file is installed to the right place), and one customizable, non-dynamic location for hard installation.
[+] Ability to delete, melt, or hide the original file after installation.


Tab Four 
[+] Entirely customizable messagebox to run on the file's first startup.
[+] Ability to self destruct on a specified date.
[+] Ability to send installation message on the file's first startup.
[+] Ability to not send logs if nothing has been typed.
[+] Ability to send screenshots with normal logs.


Tab Five 
[+] Ability to customize file's details, including the file description, copyright, and company.
[+] Customizable mutex string - mutex increases stability and functionality by preventing two copies of your file from being ran simultaneously.
[+] Customizable process name.
[+] Ability to disable and delete your file through the 'Cure' system.


Tab Six 
[+] You have the ability to save your entire application settings list for future usage.
[+] Ability to manage your saved settings very easily through the right-click menu on the settings list.
[+] Ability to make any of your settings automatically load on the program's startup.
[+] Ability to copy any of the selected settings for easy debugging and testing by any of the PN staff members.


Tab Seven 
[+] Integrated HWID grabbing and checking for the premium version.
[+] Important websites and URLs.
[+] Upgrade checking.
[+] Latest program news.


File Binder 
[+] Project Neptune comes with a fully functional file binder. View a screenshot here.
[+] Ability to bind as many files as you want.
[+] Customizable drop location for all files.
[+] Customizable drop delay for all files.
[+] Ability to copy the MD5 checksum of each file for later debugging.
[+] Ability to check what the filesize of the built file will be.


Program Tabs/General 
[+] FTP logging is restricted to the Premium version. With FTP logging, you're able to use it and the email option as a sort of double backup system.
[+] You change and test your FTP settings - your username, host, and password are verified through it so you know that they are working properly before you build.
[+] You have the ability to block websites - that is, any number of websites. This function uses the native hosts file on the your computer to block the websites, making it a simple and natural method.
[+] Ability to clear and delete Internet Explorer's browsing history and cookie files.
[+] Ability to disable the usage of Windows Run and Run commands, similar to disabling the Windows Registry Editing tool.
[+] Ability to disable the usage of the mouse's right clicks, making disabling the file much, much harder.
[+] Ability to download any file you want to on startup, included with a customizable drop name and the ability to hide the file from view on startup.
[+] Ability to delay the file's code execution on startup. This feature helps to decrease suspicion levels that the file is ran on.
[+] Included with the ability to send screenshots with your logs, you also have the ability to send screenshots at a customizable time interval.
[+] Ability to change your file's creation date to match that of another file's.
[+] Ability to change your file's icon to any separate .ico file you can find.


New Atomic keylogger: Windows 7 compatible




New Atomic keylogger: Windows 7 compatible and even more hidden!


Atomic keylogger works in low-kernel mode as a driver-based monitoring software recording every detail of PC and Internet activity. It is the optimum solution for homes, families, small and middle offices, as well as big companies with the need to monitor hundreds of employees. Atomic keylogger is driver mode low kernel Keylogger.


Thanks to its great stealth functionality ultimate power Atomic keylogger captures every keystroke typed, all passwords (including Windows logon passwords), chats, instant messages, e-mails, web sites visited, all program launched, usernames and time they worked on your computer, desktop activity, clipboard and more. Atomic keylogger is your only complete privacy assistant, it will protect your PC and inform you about all keystrokes! Download Atomic keylogger here, soon with Remote install.


Other Keylogger



It is very Simple, and user friendly, and great for the beginner Malware activist.


USER must use GMAIL. [Only Feeds Keystrokes through GMAIL] 

Max Keylogger


Different People can have Different Purposes For using a Keylogger
To System administrators:
Keylogger could help you clearly know about what have been displayed in the system. protect yourself know everything they do on your computer.

To CEOs:

The computers in your company are under your full control with Max Keylogger. You will be clear about all your employees’ performances or actions anyone using your official computer. Max Keylogger protect your business.

To Parents:

You could follow up all programs your children have run. And find out what they have search on the Internet. Protect your children form online dangers.
To All Users:
Be able to build a full control on your own PC with Max Keylogger. Besides you will be clear about what was run and when, what text was typed, etc. on your PC in your absence. Using the program constantly, you will able to restore the previously typed text in case you have lost it. With the help of Max Keylogger, you also could restore the forgotten password or the lost email.

To Computer Classes and Internet Cafes:

Max Keylogger will let you know what the users have been doing on the computers.
Key features Of Max Keylogger
Stealth:-Max keylogger is completely Undectable from Task manager,Taskbar as well as Add/Remove Menu in control panel.
It can only be opened using a special key combination and cannot be uninstalled without password.
Remote Reporting:-It is one of the best and most useful feature of Max Keylogger.You can specify and Email id and interval time after which reports will be automatically sent on your email id which includes system screenshots.
I have tested it with Gmail ID and it works perfectly fine.
Organization:-You will notice a clean interface with easy to navigate icons.It has all the options along with notifications on home screen

Syslogger Builder



 Antivirus Detection:



[x] AntiAnubis
[x] AntiBitdefender

[x] AntiKaspersky

[x] AntiMalwarebytes

[x] AntiNod32

[x] AntiNorman

[x] AntiOllydbg

[x] AntiOutpost

[x] AntiWireshark


Stealers


[x] Google Chrome (latest version)
[x] Mozilla Firefox (latest version)

[x] Opera (version 10)

[x] Windows Live Messenger (latest version)



Features

[x] Antis
[x] Mail Encryption

[x] Stealers

[x] Cookie Deletion

[x] Download Link Encryption

[x] AV Site Blocker

[x] USB Spread

[x] Startup

[x] Taskmanager Killer

[x] Clipboard Logger

[x] Steam Forcer

[x] Downloader

[x] Fake Error

[x] Melt

[x] Screen Logger

[x] Mutex

[x] Infection Notify

[x] Native Stub