Popular Post m3tal Posted March 26, 2018 Popular Post Share Posted March 26, 2018 Capabilities : — log keystrokes and store it %Systemroot%\logs\logs.txt — Shellcode injection, (open port) Compatibilities : Win (win7/8/10). Note: Upated from 2012 version.. this version works now with win10. this version don’t disable patch guard. for avoid the patch guard there is what to do : - Use a watermark utility for removing watermarks from system. - exdcute bcdedit /set testsigning on after that you can use loader or load it yourself.. there is link : This is the hidden content, please Sign In or Sign Up DON’T break it, if you need it use it. If don’t need it don’t use it. statut : undetected.. che for yourself and you will see Link to comment Share on other sites More sharing options...
bash818 Posted March 27, 2018 Share Posted March 27, 2018 -->DON’T break it, if you need it use it. If don’t need it don’t use it. statut : undetected.. che for yourself and you will see<-- Hahaha, good shit! Link to comment Share on other sites More sharing options...
Mallware Posted March 28, 2018 Share Posted March 28, 2018 how to use it? Link to comment Share on other sites More sharing options...
Popular Post m3tal Posted March 29, 2018 Author Popular Post Share Posted March 29, 2018 Reupload cause of mega deleted the file : This is the hidden content, please Sign In or Sign Up Link to comment Share on other sites More sharing options...
Mallware Posted March 29, 2018 Share Posted March 29, 2018 Reupload cause of mega deleted the file : This is the hidden content, please Sign In or Sign Up how to use it? Read More at :http://level23hacktools.com/forum/forum/hacking-administracion-remota-bugs-exploits/administracion-remota/keyloggers/112293-ring0-keylogger Link to comment Share on other sites More sharing options...
m3tal Posted March 29, 2018 Author Share Posted March 29, 2018 how to use it? Read More at :http://level23hacktools.com/forum/forum/hacking-administracion-remota-bugs-exploits/administracion-remota/keyloggers/112293-ring0-keylogger I explained how, just look. -1 Type bcdedit /set testsigning on -2 register the driver (sc create driver type=kernel binpath=«your driver path ») after (sc start driver) OR register with a loader (OCR is good), you can use trula if you want. -3 you collect keystrokes by stoping the driver (sc stop) Logs.txt is hidden when driver is running.. -4 you check keystrokes at %systemroot%\logs\logs.txt. this version works with x64 architecture.. If you have problem because of TestMode watermark, use a watermark remover. Link to comment Share on other sites More sharing options...
Lara Posted April 27, 2018 Share Posted April 27, 2018 How does it work sir ??? Link to comment Share on other sites More sharing options...
Recommended Posts