Skip to main content

How To Hack FaceBook Password














Disclaimer: This tutorial is only for educational purpose. The author or the blog owner is not responsible for any kind of misuse of this information provided.

Note: Hacking email accounts is illegal. The purpose of this post is to make you aware of how easy it is to hack Facebook and email accounts, so you can avoid falling into the traps of hackers.


 Hack Facebook Password using Keylogger









Hack a Facebook password using a keylogger involves the following steps:



  • 1.  Create your server that will hack passwords.
  • 2. Extract the icons from any software
  • 3. Bind the Keylogger to make it hidden
  • 4. Spread your keylogger to victims





Let’s start this tutorial :

First of all, for hacking any Facebook account password, we have to create our keylogger server that will run on the victim’s machine, capturing his keystrokes and emailing us the record. The keylogger server building process consists of several steps:



1. First of all download the Keylogger and a good binder. Binders are easily available via a Google search. 










2. Extract the RAR file. Now you will get one folder and three files.




 3. Open the Keylogger file. Here you will need a gmail ID and password. For safer use, create a fake Gmail account and use it .



4. Click on server settings as shown. Here, enter the time at which you want to receive reports; it’s always preferable to use a 20 minute timer for receiving files. Click on the Output box to choose the location of the file and give it a name. We recommend using a system process name to make it undetectable, like svchost, or check any process name from your task manager and name it. Other fields are optional. 



5. Click on Log and Result Setting. In Log Email Title enter the subject of email like “my keylogger report” or anything else that you you like. Click the last two options that add computer name and add the victim’s name. 



6. Now click on “Other Options.” In this section you just have to do one thing. Most hackers prefer warning message POP up, but I prefer keylogger using any message – so unclick the message button. When you bind it with any other software it should not have a warning message attached, otherwise it will be detectable.



7. Finally click on Build Keylogger. You will see your keylogger file at the location that you have chosen in the 4th step. This keylogger server file will be used to bind with other software in Binding Step.


8. Now your keylogger server is ready for you to hack Facebook accounts





Step 2: Extracting the icon file from any installer (resource hacker);





1. Open the resource hacker folder and select the reshacker file.



2. Go to its menu and open any setup file. Suppose we want to attach our keylogger to a Ccleaner setup file. Open the Ccleaner setup with resource hacker. 





3. In the menu, there is one action button. Click on it and then click save all resources.




















4. Save all the resources to the desktop or any other location of your choice.






5. It consists of two files. One is icon file and other is res file. We only need the icon file, so you can delete the other one.


6. That leaves us with the icon of installer file (Ccleaner setup icon).



Step 3: Bind the Keylogger server with any software

1. Go to keylogger folder and open the Binder.



2. Click on the button shown below to add files.


3. Add the keylogger server and the setup software (in our case it’s Ccleaner setup).


4. In the Binder menu, go to Settings. There, select the icon that we have generated in the previous step and set the location of the output file as shown.




facebook password hack,how to hack someones facebook,facebook password hacker,facebook hacking




5. Now again go to file’s menu in Binder and click on Bind files.

6. Now your Binded keylogger is ready. You just need to spread it or send it to the victim that is your friend.




Step 4: How to spread the keylogger



1. Now you have one software setup file with a keylogger attached to it. (In our case, we have Ccleaner setup with keylogger attached with it)



2. Spread your keylogger through forums. If you are a member of various forums, use them to spread your keylogger in the form of software posts.



3. Spread it through pendrives or USB hard drives. Suppose a friend asked you for a software, give them the software with the keylogger attached to it on the hard drive. 


Note: you can also attach keyloggers to images, but that can be detectable by antivirus, so we recommend avoiding that route.




Hacking someone’s Facebook account takes more than a few minutes











NoteThis tutorial is for Educational Purposes only. UnTrustableHacking   is not responsible for any misuse of knowledge.




Comments

Popular posts from this blog

Shorten your link and get paid [100% working]

What is shorte.st 1 .  Shorte.st  is a European based link shortener tool that is connected with advertising network so  that we get paid when we shorten a link and make someone clicks on it. 2. Unlike other link shortener sites, Shorte.st is the best and easy way to earn some good money. How to Register with Shorte.st – 1. Visit  This link ,  click the  “Join” tab in the upper-right side. 2. You will see a form with 3 fields that you need to fill – Email address, Confirm Email and Password 3. Click the  “Register”  button . 4. That’s it you have successfully register to Shorte.st. Use above mentioned link to register or else you cant register to Shorte.st.   Below are the steps you need to follow to Shorten any link and get paid by using Shorte. Steps to shorten any link and get paid in Shorte – 1. First of all, copy your any link and paste it in the box which is located after the Ninja head and then click on  “Shorten”  button. 2. After cl

How To Hack Wifi Using Kali Linux

How To Hack Wifi Using Kali Linux Kali linux :- Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali Linux is a complete re-build of BackTrack from the ground up, adhering completely to Debian development standards. Kali Linux is developed, funded and maintained by Offensive Security, a leading information security training company. Kali contains several hundred tools aimed at various information security tasks, such as  Penetration Testing, Forensics and Reverse Engineering. the main features of Kali linux are:- Free to use by anyone all around he world and it will always be free Wide-ranging wireless device support Open source Git tree Completely customizable Multi-language support 600+ penetration testing tools Custom kernel, patched for injection How to hack wifi using kali linux:- Kali linux provide various techniques for security testing and penetration. u

How To Hack Games in Android without Rooting

Hack Games in Android without Rooting The applications that help in hacking android games without rooting are:- Creehack Creehack is the ideal game programmer application android apparatus that you require on the off chance that you need to appreciate playing loads of video games on your Android gadget for nothing. Typically, numerous video games require that you make buys if you need to appreciate every one of the components of the diversion. With Creehack, you can sidestep every one of the impediments and after that make the most of your most loved diversion without making the buy. It Can sidestep all App installment necessities and Allows for boundless In-App buys It Does not require root access and is good with all applications It permits them to play various diversions effective without making expensive buys. LeoPlay Card The LeoPlay Card is another incredible diversion programmer android instrument that will permit