How to make Keylogger(Project Neptune. Epson sx105 cartridge reset software. You can download from there. Project Neptune 1.4. But I am unable to find any free public crypter which remains. Download the Project Neptune Keylogger. As we are on the free version of Project Neptune we can't change much in the Screenshots section. Welcome to Offensive Community. [TUT] Project Neptune (BEST KeyLogger) - COMPLETE Setup Tutorial. https://intensivels383.weebly.com/windows-xp-mini-iso-free.html. Ardamax Keylogger 4.0.5Full Version free download: Mr.HacKer: 204. Setup Tutorial for Project Neptune (Keylogger) Project Neptune is simply a top tier program in monitoring the Windows OS. FREE INTERNET DOWNLOAD MANAGER. To everybody wondering about the download link, it is dead. Use something else. Use something like Predator Pain v13 Cracked (by Meth),.
Project Neptune Keylogger
Project Neptune is simply a top tier program in monitoring the Windows OS. It’s uses are simply undefined and endless – but we’ll try to give you some insight on it.
Project Neptune is for monitoring web history, application history, and even messenger and email history through the simple usage of monitoring a computer’s keyboard input.
This keylogger is very easy to use and it works perfect.
Download the Project Neptune Keylogger
Once it's downloaded, extract the folder to wherever you want and open it up. Then open the Project Neptune.exe.
Once it's downloaded, extract the folder to wherever you want and open it up. Then open the Project Neptune.exe.
Step Two
We are going to work our way through the different sections now, so there may be alot of text. Well, we will start with the tab titled: 'Keystrokes'.
To leave this simple, we are going to check the top box, 'Use Email for Storing Logs' instead of 'FTP(File Transfer Protocol)'. Leave the log time as 20 minutes as I think that is a good time frame between logs.
If they aren't already selected, check the four checkboxes below the time delay.
Leave the 'Header' options as they are.
For the Email Settings, I used a GMail account so my SMTP Sending Server was smtp.gmail.com with a port of 587. If you are using Windows Live, simply change the SMTP from smtp.gmail.com to smtp.live.com.
For the next box, put in your email address, then your email accounts password below that, and then your email address again in the box under that.
(NB: Do not worry, no one but you sees the email and password, but if you're really skeptical, just spend a few minutes to make a new account to use. Remember to remember the details as this is where your victims logs go to!) To test your email click the Test Email Account Information button.
Just leave the FTP Settings area alone.
Okay, so once you've filled in the KeyStrokes Tab, you can click on the tab that says 'Administrative'. You don't want/need to do much in this section. If you do too much then your keylogger won't be as effective as people will get suspicious.
For example, with the first set of options, 'Task Manager', I like to keep the first option checked, 'Keep Task Manager Enabled'. I know myself if suddenly my Task Manager wouldn't work I would get kinda suspicious..
So, just leave the first option check and move onto the 'Website Blocking' section. We just want to leave this empty, unless there is a specific site you don't want your victims to access, if you want to have a laugh, then check the box and type in http://www.google.com, that way, your slave can't access Google.
You can leave the 'System Settings' section as it is as well.
For example, with the first set of options, 'Task Manager', I like to keep the first option checked, 'Keep Task Manager Enabled'. I know myself if suddenly my Task Manager wouldn't work I would get kinda suspicious..
So, just leave the first option check and move onto the 'Website Blocking' section. We just want to leave this empty, unless there is a specific site you don't want your victims to access, if you want to have a laugh, then check the box and type in http://www.google.com, that way, your slave can't access Google.
You can leave the 'System Settings' section as it is as well.
We can now move onto the next tab, so click the one that says 'Application'. For the first section, we can leave it as it is so even if your slave isn't Admin it will still work :)
In the 'Installation Directory' section, you can choose where you want the Keylogger to live. I left it in the AppData folder. The only places where I would suggest not to install it are the Favorites and the Documents folders.
For the next box, 'Original File' I like to set mine to the third option, Set Original Installation File Attributes to Hidden. These means that once your keylogger has been installed into the folder of your choice, it will turn invisible. It doesn't matter which one of these you choose, but this option will make it harder for your slave to notice.
Skip the last section of this Tab.
Step Five
Now, click the 'Extra Options' tab. Here, you can choose if you want an error message to pop up or not. I chose not to but if you want to, click the box next to the word 'Message' and fill in the text boxes. You can also select the icon to pop up with the error. If you choose to put in an Error Message, go ahead and click 'Test Program Startup Message' to see if it works.
With the 'Miscellaneous' section, make sure that the only boxes ticked are send Installation Message on User's First Program Run and Don't Send Keystroke Logs if Nothing Has Been Typed by User.
The first one will let you know when the keylogger is installed and the second prevents your inbox from being majorly spammed with empty emails.
As we are on the free version of Project Neptune we can't change much in the Screenshots section, but if you want to see a screenshot of what your slave is doing, check the top option. You won't be able to affect the time between screenshots as we are using the free version.
With the 'Miscellaneous' section, make sure that the only boxes ticked are send Installation Message on User's First Program Run and Don't Send Keystroke Logs if Nothing Has Been Typed by User.
The first one will let you know when the keylogger is installed and the second prevents your inbox from being majorly spammed with empty emails.
As we are on the free version of Project Neptune we can't change much in the Screenshots section, but if you want to see a screenshot of what your slave is doing, check the top option. You won't be able to affect the time between screenshots as we are using the free version.
Step Six
We are gonna go skip the 'App Settings' tab and go straight onto the 'Server Creation' one.
For the Server Settings section, you don't really need all these things but you can do it to make your .exe seem authentic. For description, put something describing what your pretending your keylogger is. I usually disguise mine as games so mine would have a description of the fake game. For company, make up some random company name.
For copyright, just write something like Copyright 2012.
Leave the two checkboxes unchecked. Skip the File Pumping section and the Server Generation for now.
Step Seven
So, we have filled in all the settings, now it is time to create our keylogger. You still need to be on the 'Server Creation' tab. Navigate down to the Server Generation section and click the Generate New Server button. Once you have clicked that, you will get your normal 'Save' menu. Choose where to save your program to, and give it a name. As I said before, I like to spread my keyloggers by saying they are a new game, so give it a similar sounding title.
So, just click save and there you have it, your own little keylogger
Project Neptune is for monitoring web history, application history, and even messenger and email history through the simple usage of monitoring a computer’s keyboard input.
With over fifty dynamic features, it is an extremely diverse application. You can also note, however, that the program is extremely simple and the steps to get started are very simple. However, some technical information you may like to know is that Neptune uses custom coded keyboard hooks, CodeDOM technology for unique generation on each computer you wish to use it on, and the ability to save and edit your settings at any time.
So, what is Project Neptune used for? Its usage spans across many different areas. The number one usage, however, is for monitoring the application of your computers and those who use them. You may wish to monitor your spouse. You may wish to monitor your children. Or, you may be a boss and you may wish to monitor your employees. Neptune handles all of these jobs wonderfully. Its usage, however, doesn’t stop there. Perhaps you’re a book or article author and you need quick backups of your written work. Neptune handles this as well.
- Download Information -
Download link: http://www.project-neptune.net/download/
What exactly makes this keylogger so special?
Simply put, it is one of the most stable, well put together, and all around well written loggers around. It pays attention to the minor details and offers plenty of features.
- Tutorial -
Step One – DownloadingFirst off, make sure you go to the link above to download it. You will need WinRar to extract it.
After you have downloaded Project Neptune, simply drag and drop the folder containing all the files to your desktop, like shown:
--
Step Two – Setting Up Log Storing
First off, you have to decide what you want to use to store logs. For email, I recommend using Gmail, and you can make an account for that here: https://www.google.com/accounts/NewAccount?service=mail
This tutorial will be using Email, specifically Gmail, but if you want to use FTP, using DriveHQ, it’s free and allows a lot of storage: http://www.drivehq.com/secure/FreeSignup.aspx
After you are done making your Gmail account, take a look at the picture below:
--
Step Three – Setting Up System Settings
There isn’t much to do on this tab, but I’ll give a small explanation on what it all does:
Number 1 – These options simply disable taskmanager’s ability to end your server’s process. If you activate any, choose the last one, it has the smallest suspicion level!
Number 2 – This is for blocking websites, but be weary, because it requires admin rights and will crash if it doesn’t have it. Right click on the box to add sites.
Number 3 – All of these options are self explanatory, but be warned: they require admin rights and will cause the server to crash if the client doesn’t have admin rights. Mouse over them for more information.
--
Step Four – Installation Settings
This tab is for setting up how your keylogger gets installed on your client. You need to melt your file so that it won’t get tampered with after it is ran. This is just a safety feature if you’ll be infecting intelligent people, but I always use it!
--
Step Five – Extra Options
Keylogger Online No Download
These are all of those extra options that just make it more exciting. Use the Fake Error Message if you don’t want to bind it to something/crypt it.--
Step Six – Server Generation
This is the last step!
Click on the “Server Generation” tab and go ahead and copy down the Uninstall password – you’ll need this if you ever test PN out on your computer. After that, go ahead and hit “Generate New Server” and you’re set to go!
Now that you are done, your server file should be generated if everything went ok.
Protip