Since alot of people are asking on this forum, mabye sombody should make a Guide on how to SQL attack and decompile a Keystealer.

Peace out