Basic Guide To Remote Keyloggers

Today we will consider another basic hacking technique called keylogging.  Keylogging certainly is extensively used for hacking password of facebook, twitter and even bank accounts. Keylogger is a small program that runs in stealth mode in victim’s computer and record each and every keystroke typed by user, including login information (ids and passwords). Remote keylogger is a keylogger that sends logs to the hacker via email or ftp. As there are number of keyloggers out there and most of them are pretty easy to use, keylogging wouldn’t have been a tiring task if antivirus didn’t exist, but unfortunately they do, so we need to have a strategy to fool and bypass antivirus, these strategies we will discuss later.
For now let the action begins.

  •   Download Ardamax keylogger from here
  • Extract it in a folder using winrar. As soon as you will extract it, your antivirus will start shouting but don’t bother, as it won’t harm you, but you’ll need to freeze your AntiVirus.
  • Now click on “Ardamax Keylogger 3.8.9 Full Version.exe”.
  • Click “I agree”.
  • Click "Next” 3 times.
  • Click finish, Now You will see an ardamax icon on tray, like this.

  • Right click on this icon and click on “Enter Registration Key…
  • Enter “Popescu Marian” as name and “083A-E649-5E15” as serial in the appeared dialog, now you have ardamax keylogger installed and registered in your system.
  • Again right click on Ardamax icon and click “Remote installation”
  • Click “next” 5 times.
  • Tick “Send logs every” and click next.
  • Now enter you email id and password, I suggest you to enter a gmail id otherwise you will need to know the SMPT server of you email provider.
  • Click Next 5 times and then click Finish. By now you have created your remote keylogger.



Your remote keylogger is present at location “C:\Program Files\DFC\Install.exe” (considering C is your OS drive). Now you need to send this exe to your victim, change the icon of exe and put some fascinating name, tell your victim some story and make him double click on your exe, and that’s  it you are done. You will start receiving emails containing keylogs of your victim that’s includes passwords, chat records, screenshots and even what they do offline in their PC. 
One another way to make your keylogger look unsuspicious is to bind it with another file using Binders.
      Now go and start tinkering with different keyloggers , it help you get better understanding.