redpill Hacker Payloads

redpill Hacker has many different payloads to choose from. Know what is the correct payload to use for your specific job.

Spy Software Payloads

What is a payload?

In computer security, payload refers to the part of malware which performs a malicious action. In redpill Hacker , the payload is attached to an email or a website and is delivered to the target PC. The payload will then secretly perform a specific action like installing a key logger or retrieving documents from the target computer.

Different types of payloads in redpill Hacker

There are different payloads in redpill Hacker and new ones being added with each new release. Some will only take screenshots while another will take screenshots and install a key logger. There is also another that will secretly retrieve all the documents from the target computer.

When you select a payload in redpill Hacker the details of the payload will be displayed to help you choose the right payload for the job.

spy program payloads

Payloads are grouped into two main categories in redpill Hacker:

Heavyweight Payloads

Heavyweight payloads does a lot and for longer. It installs a key logger, will take screenshots and continue to run even after a computer is restarted. They will however cause the UAC message to come up and will also have a higher detection rate than lightweight payloads. If you choose to use a heavyweight payload you should use social engineering to convince the target to run the application.

Lightweight Payloads

Lightweight payloads only run once and will only do a very specific task like take screenshots or secretly retrieve documents on the target computer. They will however bypass the UAC warning message and have a very low anti-virus detection rate (gets past 95%). Although lightweight payloads are limited in what they can do, they are strongly recommended because they have a very high success rate.

Attachment Types

There are different attachment types, and as with payload types, each comes with it pros and cons. Free email services like gmail and yahoo are very strict with what they allow. Gmail for example will block the following:

spy program attachment

It is important to remember that it is not the email service you are using but also the email service your target is using that can block certain attachment types.

attachment spy program

In redpill Hacker, when you select an attachment type, a description of the pros and cons for that type will be displayed Below is a list of attachment types with pros and cons.

Attachment Type PROS CONS
Program File (EXE) Requires no other action except to double click on the file. Allowed by very few email services. Not really useful when emailing as it will be blocked 95% of the time.
ZIP File High success rate if allowed by email. You can add a password to get past some services like yahoo. Not allowed by gmail and some other services
Wordpad (RTF) Can be used by any email service including gmail. Low success rate as the target needs to double click on icon inside the file. The attachment needs to be opened with Wordpad . MS Word will require the user to click on a warning message and Open Office will not work.
Link Very High Success Rate. You need a website. You can get website hosting for cheap and redpill Hacker can create a website for you.
PDF Normal Spoofing Works when file extensions is hidden (default option in Windows). Most anti-virus will immediately pick this up as a red flag and warn the user.
PDF RTLO Spoofing Works when file extensions is not hidden. Some anti-virus will immediately pick this up as a red flag and warn the user.
Website Payload Very High Success Rate (best) You need to purchase a domain with a hosting option (very cheap). redpill Hacker will create the website and payload for you.

For more help, also see these articles:

Remotely install a spy program
Hack in the Dark
Hacker Jargon
How to use Social Engineering to hack
How Anti-Virus detection work and how to bypass it.
Insalling a Payload from a website
Password Phishing Websites
Hacker Videos
redpill Hacker - Penetration Testing Software
Purchase redpill Hacker