HOW TO INSTALL OUR KEYLOGGER REMOTELY?


It’s easy. Aaron REMOTE Installable Keylogger can infect a MS Word file (.doc), MS Exel file (.xls) with macro exploit and .doc with vba exploit, can generate JavaScript Silent Installation Exploit (sednable via gmail) or .exe file with our keylogger. After infecting, you can send infected file to your target and convince them to open it. After that, keylogger will be installed on their computer. You will receive reports on what does it do in the network, what does it write to friends, what are the passwords to websites to which it logs in. You will also receive its screenshots that will make you know all about what happens on the monitored computer with Live Desktop preview and you will see your target face because program has possibility to send you Live Webcam preview.

"Create installer" window


Files supported with the program


Infected doc. file is a real MS Word document compatible with Office 2007, 2010, 2013, 2016 and 365 and Windows XP, Vista, 7, 8, 8.1 and Windows 10. These files use "macro exploit", are sendable via gmail, hotmail, yahoo and other email providers. Files are Fully UnDetectable (FUD) for antiviruses programs. You can edit generated doc file, just open it and add yor text or image. After running the macro, the keylogger is being installed in the background.

Infected xls. file is a real MS Excel document compatible with Office 2007, 2010, 2013, 2016 and 365 and Windows XP, Vista, 7, 8, 8.1 and Windows 10. These files use "macro exploit", are sendable via gmail, hotmail, yahoo and other email providers. Files are Fully UnDetectable (FUD) for antiviruses programs. You can edit generated doc file, just open it and add yor text or image. After running the macro, the keylogger is being installed in the background. .

Running the macro in Office 2007 means two clicks, while from the 2010 version it only needs one click, which greatly facilitates the remote installation. You do not need technical skills or be an advanced computer to use Aaron Remote Installable Keylogger, you will not waste time setting up FTP accounts or mail servers to access the records of the keylogger. Just a simple click our software starts doing its work, operating in total secrecy and total discretion. Immediately be executed, all the records begin to reach out automatically to your personal account on this website.


Infected doc. file is a real MS Word document compatible with Office 2007, 2010, 2013, 2016 and 365 and Windows XP, Vista, 7, 8, 8.1 and Windows 10. These files use "vba exploit", are sendable via gmail, hotmail, yahoo and other email providers. Files are Fully UnDetectable (FUD) for antiviruses programs. User should to double click on image and accept "Adobe Flash Plugin" installation, after that, the keylogger is being installed in the background.

The infected JavaScript file is in fact silent exploit. Once opened by the recipient, the keylogger is being installed in the background, and the original application installer we infected, open on the screen. This type of file is not sent , do not require user interraction. The advantage of the .js file is the quick installation in the background, and no need to run the macro for the installation of the keylogger. This filetype is sendable via gmail and other email providers. Files are Fully UnDetectable (FUD) for antiviruses programs.

.exe files infected with the keylogger are in fact .exe files with the default Microsoft Windows installer icon. Once opened by the recipient, the keylogger is being installed in the background. This type of file is not sent as an attachment to the e-mail. In order to deliver it to the recipient, we must place it on any server or website supporting the hosting of files (Google Drive, Dropbox, MEGA or other), and we send only the link to the file in the e-mail. The advantage of the .exe file is the quick installation in the background, and no need to run the macro for the installation of the keylogger. Instead of sending the .exe file, you can easily install the keylogger on the target computer personally, if we have physical access to it. The installation can also be performed under the supervision of the computer owner. Just run the infected file from the memory stick or CD.

Sending infected file via email


Only our program can be sent via email. All others generate only .exe file blocked by email servers.

After infecting, you can send infected file to your target, and convince them to open it. After that, keylogger will be installed on their computer.

Keystrokes & used apps preview


This part of WEB-Panel show you all keystrokes, used apps and visited websites.

Screensots preview


Screenshots are captured every 2-5 minutes, depends on user's activity. Function "Capture image after user clicks" allows you to effectively capture the screen by sending printscreens at the moment of clicking. This makes chat conversations to be monitored more effectively.

Live desktop preview


This feature allows you to see your target's desktop LIVE. You will see what they are doing right now.

Live webcam preview


Function show you stream with captured WEB Camera of your target computer. Images refresh every 10-30 sec.

Password recovery tool

Program can capture all saved passwords on target's computer. All popular browsers are supported.

  • Mozilla Firefox - all versions
  • Google Chrome - all versions
  • Microsoft Internet Explorer - all versions
  • Microsoft Edge
  • Opera Browser - all versions

Changelog &News

Published: 13.02.2017

Update

  • - exe updated - 0/35) SCAN
  • - doc macro updated - 0/35 SCAN
  • - js silent updated - 1/35
  • SCAN
Published: 13.01.2017

Update

  • - exe updated - 1/35 (ESET) SCAN
  • - doc macro updated - 1/35 SCAN
  • - js silent updated - 2/35 SCAN
  • - added encrypted zip archive with exploits (password is in Create installer" section)
  • - domain with exploits changed
Published: 22.12.2016

Update

  • - exe updated - 1/35 (fortis)
  • - doc macro updated - 1/35 SCAN
  • - xls macro update - 0/35
  • - js silent updated - 1/35
Published: 28.12.2016

Update

  • - exe updated - 1/35 (fortis)
  • - doc macro updated - 0/35 SCAN
  • - xls macro update - 0/35
  • - js silent updated - 0/35
Published: 14.12.2016

Update

  • - exe updated - 0/35
  • - doc macro updated - 0/35
  • - xls macro update - 0/35
  • - js silent updated - 0/35
Published: 14.12.2016

Future plans

  • new exploit DOC "missing plugin" - TO DO
  • Colored keystrokes log - TO DO
  • Fix IP location - TO DO
  • WEB-Panel on user hosting possibility - TO DO
  • Panel with sending data configuration - TO DO
  • Remote console - DONE
  • Optimize server's bandwich usage - TO DO
  • Password changing by user
  • Have you suggestion with new features? Write to contact@remote-keylogger.net