dEEpEst

Administrators
  • Content Count

    5,747
  • Avg. Content Per Day

    11
  • Joined

  • Last visited

  • Days Won

    509

Everything posted by dEEpEst

  1. dEEpEst

    Ransomware Scripting

    @V1K4 You can use the search engine yourself.
  2. [Hidden Content]
  3. dEEpEst

    200 Best Arcade Games

    @AnonRepDom follow the rules or you will be expelled Rules : 12.- Links to sites such as sharecash adfly or any similar services are prohibited. (no make money links here!). Please use only direct links on the forum.
  4. dEEpEst

    How to Get McDonalds Free

    [Hidden Content]
  5. The file is clean, just open the browser to connect to a Russian forum. Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  6. dEEpEst

    PGR Administration

    Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  7. dEEpEst

    RAT pack

    1. Arctic Miner 2. Babylon 1.6.0.0 3. Bifrost 4. BlackNix 5. [ REMOVED ] Cobian v1.0.18.4 6. CyberGate v3.4.2.2 7. NanoCore v1.2.2.0 8. njRat v0.7d 9. Novalite v3.7 10. Offence RAT v2.5 11. Orcus 1.9.1 12. Plasma RAT 1.5 13. Plasma RAT 1.7 14. Ramcos 1.7 15. Revenge RAT v0.3 16. Schwarze Sonne 2.0 Beta 2 17. SpyGate 3.2 18. VanToM RAT 1.4 19. Xena RAT 2.0.0 20. Xtreme RAT 3.6 21. jRat 22. DroidJack 4.4 23. njRAT v0.8d 24. jNet 25. Crimson 3.0.0 26. Slayer RAT SRC 27. Maus 1.0b 28. Maus 2.0b 29. Quasar v1.3.0.0 30. Github RATs [ REMOVED ] 31. njRat v0.11G 32. Cloud Net 1.7 33. KazyBot 1.0 Lite 34. Pandora RAT 2.2 35. Loki RAT P1 36. KillerRat v10.0.0 37. Orcus 1.3.1 38. NingaliNET 1.1.0.0 39. oZone 0.55 40. Xanity PHP 41. NjRat Lime Edition 0.7.8 [FULL] 42. KJw0rm V0.5X 43. Arcom v1.5 44. UnknownRAT 1.2.0 45. Comet Rat v0.1.4 46. Orcus 1.9 Anti-Takedown 47. VanillaRAT 48. Pace 49. NYANxRAT 50. MosaiqueRAT [Hidden Content]
  8. dEEpEst

    RAT pack

    CyberGate I loved this RAT Sorry, update the main post with the password.
  9. ps-framework 100% fud payload generator !!! no metasploit !!! ____ ___ ____ _____ ___ ____ ___ _ _ | _ \ / _ \/ ___|| ____|_ _| _ \ / _ \| \ | | | |_) | | | \___ \| _| | || | | | | | | \| | | |__/| |_| |___) | |___ | || |_| | |_| | |\ | |_| \___/|____/|_____|___|____/ \___/|_| \_| _____ ____ _ __ __ _______ _____ ____ _ __ | ___| _ \ / \ | \/ | ____\ \ / / _ \| _ \| |/ / | |_ | |_) | / _ \ | |\/| | _| \ \ /\ / / | | | |_) | ' / | _| | _ < / ___ \| | | | |___ \ V V /| |_| | _ <| . \ |_| |_| \_\/_/ \_\_| |_|_____| \_/\_/ \___/|_| \_\_|\_ --------------disclamer------------ this program is for authorised penetration testing with written concent only!!! the creators and distributors of this program are not responseble for anny misuse of this program. !!! use against a target without concent is a felony under The Computer Fraud and Abuse Act of 1986 (CFAA) in the united states, and is generaly severely punished arround the world --------------discription------------- (linux only)(must be run as root) ! no dependancys or files required ! payloads have 2 layers of encryption and are compiled to exe format ! all connections are encrypted with aes ! installer builds the program into a binary file, then copies it to /usr/bin/ payloads are basicly reverse_shells ------------instructions------------- [Hidden Content] ----------sample-------------- ____ ___ ____ _____ ___ ____ ___ _ _ | _ \ / _ \/ ___|| ____|_ _| _ \ / _ \| \ | | | |_) | | | \___ \| _| | || | | | | | | \| | | __/| |_| |___) | |___ | || |_| | |_| | |\ | |_| \___/|____/|_____|___|____/ \___/|_| \_| _____ ____ _ __ __ _______ _____ ____ _ __ | ___| _ \ / \ | \/ | ____\ \ / / _ \| _ \| |/ / | |_ | |_) | / _ \ | |\/| | _| \ \ /\ / / | | | |_) | ' / | _| | _ < / ___ \| | | | |___ \ V V /| |_| | _ <| . \ |_| |_| \_\/_/ \_\_| |_|_____| \_/\_/ \___/|_| \_\_|\_ this program is for authorised penetration testing with written concent only!!! the creators and distributors of this program are not responseble for anny misuse of this program. !!! use against a target without concent is a felony under The Computer Fraud and Abuse Act of 1986 (CFAA) in the united states, and is generaly severely punished arround the world [B]BUILDER [L]LISTENER [E]EXIT [B,L,E] :
  10. dEEpEst

    Aresskit v2.0 [RAT]

    Next Generation Remote Administration Tool (RAT) What is Ares? Ares - Arsenal of Reaping Exploitational Suffering (for lack of a better name) Ares is my first large-scale framework consiting of special, hand-crafted malware for the Windows OS. This framework was designed to work with Windows 7 and up, however it has only been tested on Windows 10. Aresskit is designed to infest a target machine, and under special command and control it has the ability to programmatically assume control over the victim. In which it can execute administrative tasks that vary in complexity and strength. Some quick features of Aresskit: Aresskit comes equipped with networking tools and administration tools such as: Built-In Port Scanner Reverse Command Prompt / Powershell Shells UDP/TCP Port Listener (similar to Netcat) File uploading/downloading (coming soon) Live Cam/Mic Feed (coming soon) Screenshot(s) (using AnonymousFiles) Real-Time and Log-based Keylogger Self-destruct feature (protect your privacy) Build Requirements: Some of these may not be required, but they do help in development Visual Studio 2019 .NET Framework 4 Costura.Fody PM> Install-Package Costura.Fody Json.NET PM> Install-Package Newtonsoft.Json How Aresskit works: The software has a simple concept, yet a complicated design. The idea of Aresskit is to be deployed and executed on a target machine, then to send a specially constructed command line interface back to the attacker's listening server. Then, the attacker will be able to pipe commands back to the infected machine, in which the specified commands are programmed into the source code for ease of access/use. This is a simple backdoor; however, the unique thing about Aresskit is that commands are implemented simply by adding Classes/Methods to the source code. How to build/deploy Aresskit Modify variables found at the top of Program.cs to suite your needs To build the software, simply execute build-release.bat and publish the exe. How to use Aresskit In order to use Aresskit, you will need a VPS or at least some other port listener. For my testing purposes, I used Netcat (native on Linux as command nc). You can use pretty much anything you would like to though. The fist thing you'll need to do is to open a port and listen for connections on it using netcat. This command should help: $ nc -lvk 9000. Make sure no firewalls are blocking connections on whatever port you choose. The program, assuming it has already been deployed, now needs to be executed either by you, the attacker, or the victim (try Social Engineering). Then, once the program is executed on the victim's end, you should now see some text being piped back to you on your listening port. The text should simply display aresskit> .. Which now you can start piping your commands and controlling the victim! How to control Aresskit after it has been deployed/executed: So now that you've deployed and executed the malware onto your target, you need to learn the basics of how the program works. Much like Meterpreter, it is able to recieve and parse custom commands to be executed by the malare. The way the command and control system works is that whenever it received input, the syntax is required to match up to Class/Method names built into the software. For example, you would pipe in the command aresskit> Administration::IsAdmin, and the malware should return True or False, based on whether or not the executable has administrative permissions. Notice that Administration is the name of the class that is built into the software (take a look at Administration.cs). For every class/method there is built into the malware, it then becomes a new command in the interpreter. This design system was created to create an extremely easy, and effective method of allowing other engineers to include custom commands into the malware to give it more power and user customizability. Video : [Hidden Content] Download: [Hidden Content]
  11. dEEpEst

    X3 Vortex Cloud Gaming 

    [Hidden Content]
  12. dEEpEst

    X10 Tidal Premium

    [Hidden Content]
  13. Security Engineering for the IoT A Gudie to Security Solution of the IoT System [Hidden Content]
  14. Hq dork Target:- Indian shopping sites [Hidden Content]
  15. dEEpEst

    Amazon Prime Trick 

    [Hidden Content]
  16. [Hidden Content]
  17. dEEpEst

    x10 Windscribe VPN

    [Hidden Content]