Jump to content
LeVeL23HackTools
  • Sign Up

Files

Sign in to follow this  

11 files

  1. $3,000.00

    Forensic BOOTKIT 0.8.2

    Судебный Bootkit 0.8.2
     
    Forensic - это Банковский троян, встроенный в стиль персистентности буткита.
    Продукт имеет описательное руководство по настройке и использованию криминалистического трояна.
    Троян работает на:
    Windows XP -> Windows 7 -> Windows 8,8.1 -> Windows 10
     
    Возможности судебной экспертизы:
    -> Установка с помощью патча ядра Win NT.
    -> Впрыскивание происходит очень рано (через 5 секунд после загрузки), в разных драйверах Windows.
    -> Функция hvnc, у вас также есть руководство по установке.
    -> Поддержка Formgrabber для IE, FF, CH.
    -> Конкретный кейлоггер, Вы можете установить название Windows, ключевые слова.
    -> Заблокировать доступ к сайту, например avira.com, Kaspersky.com.
    -> Webinjects сделаны проще, чем раньше.
    -> Полиморфный инжектор шеллкода.
    -> Ring0 Rootkit скрывает файлы ботов и весь трафик ботов от антивируса, Explorer.exe, автозапуска, антируткита Gmer.
    Сторона серверов:
    -> Серверная часть полностью настраивается, вы можете установить анонимизаторы, изменить транспорт ..
    -> Вы можете активировать общий доступ к конфигурации в режиме P2P (боты будут делиться задачами при обновлении).
    -> Вы можете активировать веб-интерфейс, (виден только по разрешенному вами IP-адресу.)
    -> Remotly экспорт formgrabs на пользовательские ftp.
    -> Вы можете настроить более 20 серверных контроллеров.
    Заметки :
    Купив продукт, вы получаете: бесплатные обновления и повторное использование в течение всей жизни + бесплатные обновления Formgrabber каждые 2 месяца (вы просто заменяете плагин).
    Обновления:
    11.05.2018  -> (v8.1) Исправлена проблема с инъекцией буткита для Win10 Redstone 3.
    11.07.2018 -> (8.2) Теперь вы можете создавать своего бота в формате, кратном: EXE, DLL, JS, VBS, JAR и VBA.

    0 purchases  

    Updated

  2. $50.00

    CRYPTER PRIV8

    This crypt is elbowed in Visual Basic 6, it has no dependencies.
    Use DES encryption.

    Other options are:
    EOF Data Realing PE Cahnge EOP  
    The ratio of AV's can not be offered because right now there is no service provider that offers us multi scanners that do not distribute samples to AV's, "the remedy would be worse than the disease".
    However we ensure a good ratio, 3/31. Note that this crypter has been created since 0, and is not used by anyone or used by anyone other than you.
    Have a happy encrypted.
     
    Scan Update:
     
     

    0 purchases  

    Updated

  3. $100.00 PRIV8

    FINEST COLLECTION OF HACK BUNDLE FROM DEEP WEB!

    FINEST COLLECTION OF HACK BUNDLE FROM DEEP WEB!
    This Pack Contains Many Tuts,E-Books & Manymore To Make You A Pro Hacker!
    ━━━━━━━━━━━━━━━━━━━━━
    You can download these books and guides for free if you are a PRIV8 user. 

    0 purchases  

    Submitted

  4. $100.00 PRIV8

    BEST CRACKING PACK - 600 PROGRAMS!

    CHECKERS | TUTORIALS | TOOLS | CHECKERS TUTORIAL | CONFIGS | DEHASHERS & MANYMORE     Cracking pack contains:
     
    < Checkers >  
    AIO Amazon 4Shared Mediafire Mega CoinPot Ebay Email Fortnite Minecraft Steam Origin Playstation Uplay Instagram Hostinger Host1Plus FastComet A2Comet Facebook File Factory Hulu Netflix Twitter Twitch Skype SentryMBA SocialClub Storm Uber NordVPN ExpressVPN HMAVpn NordVPN ProtonVPN CyberGhost PureVPN IPVanish Woxy PornHub Blockchain Brazzers G2A Skrill Apple Coinbase Discord Blizzard EpicGame Localbitcoin Microsoft Nordstom Starbucks Wish  
    < Configs >  
    SentryMBA Storm
     
    < Cracking Tutorial >  
    2 Tutorial  
    < Dehashing >  
     Hashcat  
    < Dumping >  
    SQLi Dumper SQLMap
     
    < Dorking >  
    SQLi Dork SQLi Dorking  
    < Proxy >  
    GatherProxy KIDUX Proxy uProxy  
    <  RDP Cracking >  
    KPORTScan RDP Crack WordList Usernamelist  
    < Tools >  
    AntiPublic ComboEditor Dorker Duplicator Remover Slayer Leecher Split Combo  
    <  VPN >  
    Betternet NordVPN   ━━━━━━━━━━━━━━━━━
    You can download these books and guides for free if you are a PRIV8 user

    0 purchases  

    Submitted

  5. $200.00

    AZORult стиллер, stealer - Мощный стиллер паролей и криптовалют(official sale)

    AZORult3 - Passwords, cookies, cryptowallets, files, etc stealer

    Многофункциональный нерезидентный стиллер.
    Функционал:
    [SPOILER="СТИЛЛЕР СОХРАНЕННЫХ ПАРОЛЕЙ, COOKIES, АВТО-ЗАПОЛНЕНИЙ ИЗ БРАУЗЕРОВ"]
    • Google Chrome
    • Mozilla Firefox
    • Internet Explorer
    • Microsoft Edge
    • YandexBrowser
    • Opera
    • InternetMailRu
    • ComodoDragon
    • Amigo
    • Bromium
    • Chromium
    • 360Browser
    • Nichrome
    • RockMelt
    • Vivaldi
    • GoBrowser
    • Sputnik
    • Kometa
    • Uran
    • QIPSurf
    • Epic
    • Brave
    • CocCoc
    • CentBrowser
    • 7Star
    • ElementsBrowser
    • TorBro
    • Suhba
    • SaferBrowser
    • Mustang
    • Superbird
    • Chedot
    • Torch
    • Waterfox
    • Cyberfox
    • Comodo IceDragon
    • PaleMoon
    [/SPOILER]
    (Cookies в формате Netscape, в админке имеется конвертер в JSON)
    Стиллер сохраненных паролей из:
    Почтовые клиенты
    • Outlook
    • Thunderbird
    FTP клиенты
    • Filezilla
    • WinSCP
    IM-клиенты
    • Pidgin
    • PSI
    • PSI Plus
    Стиллер криптокошельков:
    Anoncoin, Armory, BBQcoin, Bitcoin Core, Bytecoin, Craftcoin, DashCoin, Devcoin, Digitalcoin, Electrum, Fastcoin, Feathercoin, Florincoin, Franko, Freicoin, GoldCoin, I0coin, Infinitecoin, Ixcoin, Junkcoin, Litecoin, Luckycoin, Megacoin, Mincoin, Monero, MultiBit, Namecoin, NovaCoin, Phoenixcoin, PPCoin, Primecoin, ProtoShares, Quarkcoin, Tagcoin, Terracoin, Worldcoin, Yacoin, Zetacoin
    Подмена кошельков при копировании(клиппер):
    Bitcoin, Bitcoin Cash, Ethereum, DigitalCash, ZCash, Monero, Litecoin, Ethereum Classic, Dogecoin

    Стиллер переписки из Skype
    Стиллер куки-файлов Telegram, по которомы можно попасть на аккаунт
    Стиллер файлов клиента Steam (ssfn+vdf)
    Возможность сделать снимок экрана в процессе работы стиллера (screenshot)
    Мощный граббер файлов:
    - Возможность указывать стартовые каталоги для поиска
    - Фильтр по маске имени файла
    - Фильтр по размеру файла
    - Обработка подпапок
    - Обработка ярлыков
    - Исключения
    Сбор системной информации:
    - Список установленных программ и их версий
    - Древовидный список запущенных процессов
    - Информация о процессоре, видеокарте, ОЗУ, разрешении экрана, раскладках клавиатуры, таймзоне, имя пользователя, компьютера, версия ОС
    Встроенный лоадер:
    - После отправки отчета может скачать и запустить указанный файл
    Нужный функционал включается/выключается в админке
    Админка
    - Устанавливается на ваш хостинг
    - Имеет различные фильтры в списке отчетов и паролей.
    - Возможность скачать отчет с машины, который представляет из себя zip-архив с данным

    Дополнительные функции
    - Стиллер умеет перезапускаться от имени юзера, если запущен от имени системы
    - Самоудаление после отправки отчета (включается в админке)
    - Поддержка .bit доменов
    - Возможна сборка в dll
    Скриншоты:

    Размер .exe: ~110кб (со сжатием UPX~40кб)
    Последний апдейт азора(20.1.2019)

     
    Цена: 200$
    Доработка стиллера под ваши нужды(идеи) от 500$ Связь(jabber): crydbrox@sj.ms
    Telegram: @bfox_stealler
    Что делает данный софт:

    0 purchases  

    Updated

  6. $1,000.00

    12GB of Fake IDs & Tutorial Pack

    12GB of Fake IDs & Tutorial Pack

    Different Countries & Different Stuff. ( Indian Passports Too )

    0 purchases  

    Submitted

  7. $200.00

    GLEAM Ransomware Attack

    GLEAM Ransomware Attack v2
    Ransonware Private
    Rescue of 300 dollars
     
    Options:
    Encrypted key BTC
    DisableTaskMgr
    Start with windows
    Start Run windows shell
    CryptoPay payment geteway
     
    Kidnapper languages:
     
    Buy the hijacker for $ 200

    1 purchase  

    Updated

  8. $1.50

    PL Maker

    it's a fast and easy to use app,with this app you can make a password list with your words and your methods.
    you can add words and methods with select their files or add them with type.
    when password list generated that's save in a folder that name is 'result' in a text file,you can use that in your cracking apps.
     
    Pl maker by Abbas.mp4

    0 purchases  

    Submitted

  9. $58.00

    CRYPTER PRIV8

    CRYPTER PRIV8
    Crypter Private
    Unique stub
    Buy the crypter for 50€

    0 purchases  

    Updated

  10. $10.00

    Traffic Bot

    This is a traffic bot, and it's pretty good way to earn money ;) u will need just a good proxy and idea how u will use it
    features :
    open website via built in browser through the proxy
    click on specified coords
    Virus Free And Clean Version ;) 
    also fixed few bugs ;) 

    you can use this bot on link shortners, or increase your website traffi or even click on ads on your website and earn some more
    anyway your earnings depends on your idea and you ;) 
    Have Fun
    P.S I'm Not Responsible For Any Your Actions
    Screenshots from buyers 

    0 purchases  

    Updated

  11. $1,000.00

    Extreme Protector SRC (VB6/C/ASM) No Dependencies Compatible Native/.Net/x86/x64

    General description:
    Extreme Protector is made and improved for more than 1 year by experienced codder/reverser in this field for more than 6 years.It is a 100% private project never used nor released made as cryptographic and educational purposes.Code has been tested,modded and  improved for many many times until every feature is working 100% together others features.Working on all Windows from Windows xp to Windows 10.Stub code is optimized,reduced,as fast as possible for efficiency and removed most dependencies to work properly on most windows,stub size goes from 32kb to 450kb.Protector or client is made in pure VB6 and the different stubs are made in pure VB6 and others one mixing VB6 with full ASM and C,i mean fully integrated ASM and C,not inline one,developed with ThunderVB,a powerful tool to mix perfectly ASM and C with VB6 with no limits.There are 11 stubs and here their characterictics:
    Pure VB6:
    1-Basic(VB6):Only VB6 without anything
    2-Basic + anti emulation-debug(VB6):Only VB6 with anti emulation.
    3-Basic + invokes(VB6):Only VB6 with apis taken via asm inline invoke,most apis used are not declared in code.
    4-Stub Inside Program P-Code:Basic(VB6) stub inside or mixed with real program VB6 source compiled in P-Code.
    5-Stub Inside Program P-Code + anti emulation-debug:Basic + anti emulation-debug(VB6) stub inside or mixed with real program VB6 source compiled in P-Code.
    6-Stub Inside Program Native Code-Small:Basic(VB6) stub inside or mixed with real program VB6 source compiled in Native-Code.
    VB6/C/ASM mixed:
    7-Basic + ASM:Basic(VB6) stub with VB6 procedures replaced by pure ASM like instrt,len,mid,some  strings,strptr,varptr,left,right,api calls among many others.This aplplies by default for next ASM stubs.
    8-Basic + ASM + C + anti emulation + anti debug:Basic + ASM stub with anti emulation and debug made in VB6,C and ASM code.
    9-Stub Inside Program Native Code-Small + ASM + C + anti emulation + anti debug:Basic + ASM + C + anti emulation + anti debug  stub inside or mixed with real program VB6 source compiled in Native-Code.
    10-Basic + ASM + C + anti emulation + anti debug + experimental compilation:Basic + ASM + C + anti emulation + anti debug stub  with uncommon compilation parameters like custom DOS stub,sections merge etc.This is possible due to custom compilation  parameters in C code and changing VB6 linker and compiler parameters in the VB6 project file.
    11-Basic + ASM + C + anti emulation + anti debug + runpe nt simple:Basic + ASM + C + anti emulation + anti debug stub with nt apis runpe,most apis called by ASM code.
    Detailed information
    Stubs Features:

    Optional:
    +Advanced anti VBox/VMware:check 6 critical places with 2 methods to detect if the file is running under virtual machine.
    +Advanced anti Sandboxie:check process and dlls to detect if the file is running under sandboxie.
    +Advanced anti Analysis:check with 15 procedures to detect if the file is running under analisys environment.
    +9 different injections options
    +2 different storage file methods:End of File and Resources.
    +Fake error message: can selest if you dont want show the message when the file runs at startup.
    +Run as Admin:run file as with Admin privileges.
    +Install:can choose folder to install(user/alluser/commonprogramfiles/appdata/temp) with custom filename.
    +Hidden startup:run file every time system starts,the start key is hidden from msconfig.
    +Delay:Delay the execution of the file in seconds.
    +Binder that can run 2 files binded:
     Executable file wich is executed on memory.There are 9 different injections options.
     Any custom file wich is executed normally.
     For both binded files there are these options:
     +Anti Sandboxie
     +Anti VBox/VMWare
     +Pump bytes
     +Dont run the binded file at startup
     +2 different storage file methods:End of File or random resources
    Forced:
    +Anti Dump:3 different methods of anti dump(ASM/C)
    +Anti Emulation:many different methods of anti emulation(VB6/ASM/C)
    +Remove ZoneID:remove automatically ZoneID of the installed file when install option is activated(VB6/ASM).
    +Random RC4 password to decrypt the protected files.

    Client Features:

    +Clone assembly:can change protected file cloning information and icon from other PE files(exe,dll,scr,ocx).
    +Custom icon:can change the icon with any custom icon
    +2 different methods to clone information and icon or change custom icon you can choose:
     +Resource method:Resource Hacker method
     +Code method:With internal code
    +Add KBs:add random kilobytes to the protected file with 2 methods automatically:
     +If storage method is resources the extra kilobytes will be added to resources and if storage method is End of File the   extra kilobytes will be added in the End of File.This apply to main file and 2 binded files too.
    +EOF:Detect automatically if the file to be protected has overlay and put that data to the protected file.
    +Realign EOF: Realign End of File data with headers.
    +Realign PE: Realign Portable Excutable Headers.
    +FixChecksum:Fix the checksum of the file.
    +Null Icon:Delete full icon of the protected file.
    +Null Info:Delete full Information of the protected file.
    +Zero EntryPoint:Set the EntryPoint of the file to 0.
    +Change OEP:Change Original EntryPoint to another place.
    +UPX:Compress the protected file with UPX.
    +Erase Paddings:Erase "XPADDING" strings from the resources.
    +Add Section:Add custom section to protected file.
    +No comdlg32.ocx dependence for working.
    +Autodetect if file is native or .NET and select automatically the proper injection for working properly.This apply for main
    file and binded executable file too.
    +Error proof:if something is wrong with your options before protect, protector will warning you or change/disable options to
    avoid errors in protection process.
    +RC4 encryption with different random password generated every protection.
    +ID and type resources are randomly generated every protection automatically.
    +Real random process to generate random strings, passwords etc.
    +Drag and drop for all fields.

    I Will sell only 1 copy exclusively to the highest bidder.I will provide you full source project with compiled binaries and all needed to compile if you need.Any question or whatever please ask me i will reply you as soon as possible.
    If you buy Extreme Protector you must accept these terms:
    1- Extreme Protector is coded to protect legal files.
    2- Illegal activities are not allowed. Before doing anything read about the laws of your country.
    3- Extreme Protector was coded for educational purposes.
    4- I am not responsible for any actions from you using Extreme Protector and their outputs.
    Screens











     

    0 purchases  

    Updated

Sign in to follow this  
×

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.