Creating a keylogger (server) using GDPK

If you do not have a copy of GDPK, download it from here

This guide assumes that you have downloadeded the application and no errors occur when you run “GenesisDatabase Productive Keylogger.exe”, any error or bugs found could be posted here as a comment.


Let us get things started, once you have run GDPK you will be brought to the Connection tab automatically.  Choose either FTP or Email for your upload selection.  Take note that Email option only allows Yahoo email as the sender.  However the receiver which receives the log is not limited.  (Sender and receiver aren’t the same – sender sends the email and receiver which stores logs receives the email.  Meaning that you can protect your receiver email from being stolen in case of any hijackers.)

File Transfer Protocol (FTP)

For the FTP upload users, i will be giving an example of the server, username and how to user the remote folder feature.  Generally i am used to using as storing any text files so i will be using this domain as the FTP server.

Server: or (either one, it does not matter)
Username: (replace username with yours)
Password: 123456789 (you know what to do)

Generally the most vital information are these 3 and make sure they are correct – use the Test button to make sure that you could login too.  As for those that want to use the Remote Folder feature, tick on it.  The input that you will enter should be the folder you want it to direct to.  If i would like to use root folder it would be “/” without the quotes – but you don’t really have to do this because by default uploads should go to root.  However if you have a folder under root called Logs you would enter “/Logs” without quotes as your input.  And if you have a sub-folder under Logs called GDPK you would enter “/Logs/GDPK” without quotes as your input.


For those that wishes to use Email for their storage of logs it is recommended to have your sender and receiver different.  One is to protect your email from being stolen and second is to have your sender different each time you create a keylogger (server) so that you would not have only 1 sender for 1000 logged users.

Password: 123456789

Now that we are done for the upload options, select the interval in minutes you would want the logs to be uploaded or the log size before it is being uploaded.  Unlike other keyloggers, GDPK allows you to have the option to select the interval before it uploads (commonly found in any keylogger) and also the option to upload when it reaches a specific log size.  I would suggest to use below 1000 kilobytes.


Click on Install tab once you have finish the first part.  The Install tab allows you to choose installation settings for the keylogger (server) that you are going to create.

“Start on system startup”

Once ticked, it enables two checkboxes below it which are HKLM\Run and ActiveX Key.  They both do the same thing, run the keylogger when winlogon is done executing or in simple English the user has logged in.  Select either one or both but you must select at least one.  Any name would do for HKLM\Run but something that does not sound common (we do not want the user to guess what this is now do we)  As for the ActiveX Key click on “Random” to generate random ActiveX keys.

“Copy File”

This feature allows the keylogger (server) to installs itself into the Windows operating system.  Filename refers to the new name for the keylogger (server) that has been installed into the system.  There are several extensions that you could use if you do not wish to use .exe.  Then there is the System and Windows Folder option, choose either one only.  System refers to C:\Windows\System32 (in most cases) and Windows refers to C:\Windows (in most cases).

The Melt option awhen ticked, allows the keylogger (server) to delete the original file once it has installed itself into the system.

Error Message

Before proceeding, take note that this feature is not recommended to be used if the “Copy File” feature is not used.  If the “Copy File” feature is disabled and “Error Message” used, the application will display an error message every time the user logs into Windows operating system.

Other than that, this section is self-explainable.

Version Information

This particular tab provide users with the feature to duplicate version information from a different file.  To use this, select one of the provided version information on the right tree.  To view their version information, simply browse to the GDPK folder under version information.

If you would like to duplicate a version information, use the “…” browse button and select any .exe or .dll files consisting of version information.  You can also save it using “Save” button to use it later in future by selecting it from the tree on the right.

Resource Hacker

For those that are common users that needs to use Resource Hacker, double-click on the icon to launch the application.


Alright, this section is also pretty much self-explainatory.

Disable – Disables the application from running via registry.
Kill – Kills the application when it is found running.
Bypass firewall – bypass Windows Firewall (tested on Windows 7 and XP).
Increase size – increases the filesize of the keylogger (server).


Generally it is the icon for the created keylogger (server).  You may use the icons that have been included or browse for one of your own.

Icon Extractor

If you wish to use an icon from a different file (let’s say from the file that you have duplicated the version information and what is left is the icon), browse for the file and click extract.


To finalize everything, go to the Build tab and press “Build” once you have entered the filename (do not forget the extension .exe or other extension of your choice).  The output folder will be displayed on the right.  To change the output folder destination you can go to General tab under “User Settings”.

Thanks for using GDPK.

GDPK is currently free

Originally released here – HackForums

Download link – MediaFire


This application is not free forever, for purchase please go here.

Please provide feedback or any bugs found to