Giveaway of the Month: Kaspersky Internet Security 2012

FAQ: What is Binder and How to Use It for Hacking?


Binder : Hacking software to hide Keyloggers, Trojans and Viruses

Binder is a software used to bind hacking tools, viruses, trojans with say images, mp3, exe, batch or any other file, you desire. In this article i'm going to explain you what is Binder and how can you use it for hacking.

What is Binder?

Binder is a free software used to bind or combine two or more files in one file under one name and extension. The files to be binded can have any extension or icon. The user has choice to select the name, icon and various attributes of binded file. If binded file contains an application ( RAT or Keylogger), the application is also run when the actual binded file is run.

Why is Binder used?

As I have written in previous articles, generally, RATs and keyloggers are detected by most antiviruses. Also, you can't send victim a RAT or keylogger and ask him to install it on his computer. So, you have to bind that RAT or keylogger with say image, movie or song (any file depending on victim) and then ask him to run this binded file on his computer. You can use Ardamax keylogger.

When the victim runs our binded image (binded with Ardamax keylogger) on his computer, keylogger is installed on his computer and we can easily obtain all his typed keylogs.

How can I get a Binder?

There are many binders out on internet. Just Google "Download binder" and you'll get a list of Binders. There are also many forums, like Hackforums where you can find good and free binders. Here you can Download Shock Labs File Binder - binds JPG, MP3, EXE, and BATCH files.

Disadvantage of Binder:

Binders though are useful in hiding keylogger or trojans are often detected by antiviruses as hacktools and hence deleted as viruses. For preventing this deletion and to bypass AV detection, you need to have FUD Binder. You can obtain FUD Binder either from various Hacking forums (where you are asked for money) or by coding one yourself.

Remember, no publicly available Binder is FUD. Binder is FUD only if it's very rarely used and not available publicly.

Also, it is better to use Crypters to avoid AV detection. It is general practice to first crypt the keylogger or trojan with Crypter and then bind the crypted trojan to make it deceptive. There are also many Crypters available on the net and the forums.

Very Important: Do not scan these tools on VirusTotal. Use and also check the "Do not distribute the sample" option.

Also read:
What is FUD Crypter - Bypass antivirus detection for RATs and viruses

Do you have questions, comments, or suggestions? Feel free to post a comment!

Liked this post? Make a PayPal Donation to keep us strong.

Subscribe to this Blog via Email:

Click here to Subscribe to Computer Hacking and get all new tricks and regular updates to your inbox!!


12 comments to "FAQ: What is Binder and How to Use It for Hacking?"

computer keylogger said...
April 20, 2010 at 3:05 PM

Keylogger Software Secretly Monitors Activity Of Computer Users. This Is Keylogger That Overcomes Invisible Mode In Browsers Like Google Chrome. The User Interface Is Browser Based. Very Low Return, Software Disabled If They Return It.This site has all the infos needed about Keylogger Software

Aleksandar said...
May 5, 2010 at 11:50 AM

Ok, first try to crypt the server.exe file and then bind it. I have posted an AIO Software that contains all of these tools, Keylogger, FUD Crypter, Binder, Icon Changer and File Pumper

Hope this will help you

Anonymous said...
May 6, 2010 at 11:36 AM

hi aleksandar - when i try to run the binded file it says "Windows cannot access the specified device, path, or file. You may not have the appropriate permissions to access the item"

also if the binded file is an .exe file, how would you send it to the victim as most email programs don't send .exe files. Thanks.

Aleksandar said...
May 6, 2010 at 2:46 PM

You need to login as administrator in Windows. And you can add to a rar archive the binded .exe file and send it via email.

Anonymous said...
May 6, 2010 at 6:40 PM

eset nod detected as a virus after bind with this

Aleksandar said...
May 6, 2010 at 6:49 PM

After you bind the file you need to crypt it using FUD Crypter, so it can be undetectable to AVs. I've been writing about crypters on this blog, give a little search.

Anonymous said...
May 21, 2010 at 2:26 PM

can you upload a binded +crypted to say pirate bay or ripedshare and it still work? thatnks

Anonymous said...
June 15, 2010 at 1:33 PM

after bind 2 file then the last step to crp have to choose to save with exe file??how?where and whit what??thank

Anonymous said...
June 15, 2010 at 2:35 PM

if i add to rar.file and send to victem but if victim dont have win rar program so they will not be able to open the file i sent yes?so how it can work can i send exe.file the aother way and if can open direcly when victime open it ??

Aleksandar said...
June 15, 2010 at 4:58 PM

You can upload it to a site like, speedyshare or mediafire and send him the link.

Anonymous said...
September 15, 2010 at 2:32 PM

Fzzz... Bzzz...

DESCRIPTION: Learn what Binder is and hack with it.
PROBLEMS: No Problems
QUESTIONS: When I bind a Server.EXE with a file, will the file be infected by the Server, or will there just be created a new file with both the EXE's into it?
ANSWERS: Please Answer...

Anonymous said...
October 11, 2010 at 9:22 AM

can the exe file from binder extension be changed to jpg? or does it need to stay an exe file?

Post a Comment


Copyright 2014 All Rights Reserved Revolution Two Church theme