Did you know that one can easily look at what you are doing on your computer no mater how far he is?
Well, to day we'll discus on a very easy easy way to monitor a computers activity using a keylogger called Emis. This tool takes screenshots of the victim computer and sends the information to your Email (gmail) along with the logs
With this simple trick, You will be able to see what your victim computer is doing, What time he is doing it, All Links he goes to, What websites they visit, Some times, Even what passwords they Use, What videos they watch, Music they listen to. ETC
With this simple trick, You will be able to see what your victim computer is doing, What time he is doing it, All Links he goes to, What websites they visit, Some times, Even what passwords they Use, What videos they watch, Music they listen to. ETC
So. Let's Roll:
Step 1
Open Emis Key-logger to enter your Gmail and password [Just to be clear, don't use your personal gmail unless you don't mind ]
I recommend you open a new gmail for testing this trick. after filling the info. click on test email. You should get an email in gmail.
Options
- Block AV Sites : Blocks Virus Scanning Websites on victim's computer
-TaskManager: Disable TaskManager on victim's PC
-Regedit: Disable Regedit on victim's PC
-Regedit: Disable Regedit on victim's PC
Step 4
Click on Build.
An extra file will be created called server or the name you typed in emiss. This is the file you send to your victims and when they click on it, Their computer starts sending you reports of what they have been using the computer for. The reports are all generated to your gmail. + every report sent will included at least one screen shot of the computer.
You may as well use soft wares like Crypter to bind this server file with say any. Mp3 file so that whenever victim runs mp3 file, server is automatically installed on his computer without his knowledge.
An extra file will be created called server or the name you typed in emiss. This is the file you send to your victims and when they click on it, Their computer starts sending you reports of what they have been using the computer for. The reports are all generated to your gmail. + every report sent will included at least one screen shot of the computer.
You may as well use soft wares like Crypter to bind this server file with say any. Mp3 file so that whenever victim runs mp3 file, server is automatically installed on his computer without his knowledge.
Step 5
Upload it to Free File Storage Domains, like Mediafire, Speedyshare, Ziddu.com, etc.
That's it.
Now all you need to do is start spreading it. just make sure you make your file has an attractive name that one would be curious to open it.
Once the victim runs the keylogger file on the computer, the tool starts right away collecting and sending reports on his computer to his email
Here some images:
Simple. right?
Now all you need to do is start spreading it. just make sure you make your file has an attractive name that one would be curious to open it.
Once the victim runs the keylogger file on the computer, the tool starts right away collecting and sending reports on his computer to his email
Here some images:
Inbox:
In a mail:
Simple. right?
AD -----------
Let's create professional Social Media Posts for your Business at as low as UGX 75K ($23).Social Media Marketing has never been this simple, fast, and affordable: www.socialclark.com
Let's create professional Social Media Posts for your Business at as low as UGX 75K ($23).
The File is A Virus(You can scan it on (www.virustotal.com)
ReplyDeleteIt's a tool that makes a File that can Send you real time updates of any computer u put it. So yes, Even an ordinary Antivirus should see it as a virus. But no waries, it is bcause it can make a virus.
Deleteso should i upload Crypter with the key?
ReplyDeleteUpload the file that was out put by crypter if you must use crypter
Deletecan you show me where can i get crypter or can send it to me?
Deleteplease oo so, man help me.