-
Content Count
68 -
Avg. Content Per Day
0 -
Joined
-
Last visited
Content Type
Profiles
Forums
Calendar
Store
Blogs
Gallery
Downloads
Articles
Everything posted by m3tal
-
404 not found
-
There a new exploitation technique of that ss7, You can even control the remote phone camera & mic via gsm commands. If anyone need this type of service just write me I will do a demo, u will be impressed xD
-
I posted in Priv8 some good botnets with hvnc chekc it !
-
Most Famous Dark Web Marketplace that Sells Hacking tools & Malware about to Shut Down Next Month
dEEpEst replied to topic's m3tal in FYI
The will come back in 2020.. -
Hello guys, Here is an updated Implant installer from WINTI group, with this tool you can install a persistent backdoor on any system from Win2K to Win10. The rootkit will hide inside various legit windows apps in system32, like net.exe, regedit.exe, it also have a polymorph code that you can activate with a special commmand. There is also a readme manual, if you need it ask me in PM. [Hidden Content]
- 1 reply
-
- 7
-
-
- rootkit/implant
- win-nti
-
(and 1 more)
Tagged with:
-
Hello manifest, If you want a good rat about 6ko.. with snm rootkit functions much better than gov I van provide you
-
@yoyohoneysinger you posted in wrong section , and we alredy have it on the bord
-
BnD is a console type botnet controler for windows, stub is about 70kb.. type "help" for help. - Sock5 proxy. - Dl/exec. - Stealer. - Ransomware. [Hidden Content]
-
Explain more, what type of man the middle and in what configuration ?
-
It's tested, default password is password but you can change in the DB
-
[Hidden Content] Mirror: [HIDE][Hidden Content]]
-
trojan SAS (Advance RAT)[Android][Windows] + Setup Tutorial
dEEpEst replied to topic's m3tal in Trojans
Test it on a computer and tell me if it show you the client on the controller.. mine is crashing when i have 1bot connected -
trojan SAS (Advance RAT)[Android][Windows] + Setup Tutorial
dEEpEst replied to topic's m3tal in Trojans
I tested it’s not working when I have 1 connected the program just exist.. when i have like 120 it don’t even launch.. big shit -
Mephisto is web tool that you can install on webserver for your targeted attacks, there are plenty of uses for this type of framework.. [Hidden Content]
-
Tunnel rat : - process protection - keylogger - screnshot - file loader The trojan server side is a web server. The client check the webserver and add or repive tasks. The trojan install itself on computer via basic persistence technique, and comunicate with web server. Trojan + Trojan controler is coded both in asm, only server side is in php [Hidden Content]
-
Indonesian PHP mailer framework - You can put an ifinite number of smtp servers, the mailer will switch between them. - Special header for passing gmail spam detection.. much more.. [Hidden Content]
- 2 replies
-
- 25
-
-
- indonesian
- mailer
-
(and 1 more)
Tagged with:
-
I don't put the real name for avoiding google indexing everything. Features : - 25kb stub. - Using pastebin instead of DNS services. - Keylogger. - Built in Remote Sreen watcher. - Ransomeware. - File loader. It comes with full source, so enjoy ;)... [Hidden Content] Add Mirror: [hide][Hidden Content]]
-
Antidetect 2018 Pro Spoof Device ID, Vendor Id/ Fake Device ID, Vendor Id Spoof BIOS manufacturer, version, date etc./ Fake BIOS manufacturer, version, date etc. Spoof ACPI tables values/ Fake ACPI tables values Spoof Firmware version, revision, date, serial, model etc. / Fake Firmware version, revision, date, serial, model etc. Spoof CPUID/ Fake CPUID Spoof GPU/ Fake GPU Spoof Computer name/ Fake Computer name Spoof User account name/ Fake User account name Spoof Windows ProductID/ Fake Windows ProductID Spoof InternetExplorer ProductID/ Fake InternetExplorer ProductID Spoof Windows Install data/ Fake Windows Install data Spoof Windows Build ID/ Fake Windows Build ID Spoof Security Identifier- SID/ Fake Security Identifier- SID Spoof WSUS Client ID/Fake WSUS Client ID Spoof PC GUID/Fake PC GUID Spoof Network adapter GUID/ Fake Network adapter GUID Spoof DTC/ Fake DTC Spoof DHCP v6 DUID/Fake DHCP v6 DUID Spoof Logical volume ID/Fake Logical volume ID Spoof Network adapter mac address/ Fake Network adapter mac address Spoof Canvas fingerprint/ Fake Canvas fingerprint Spoof WebGL fingerprint/ Fake WebGl fingerprint Spoof WebGL vendor/ Fake WebGL vendor Spoof WebGL renderer/ Fake WebGL renderer Spoof WebGL extensions Spoof Fragment Shader Spoof Vertex Shader Spoof WebGL2.0 functions parameters/ Fake WebGL2.0 functions parameters Spoof ClientRect fingerprint/ Fake ClientRect fingerprint Spoof Font fingerprint/ Fake Font fingerprint Spoof WebRTC DeviceID fingerprint/ Fake WebRTC DeviceID fingerprint Spoof AudioContext fingerprint/ Fake AudioContext fingerprint Spoof Flac Audio fingerprint/ Fake Flac Audio fingerprint Spoof UserAgent/ Fake UserAgent Spoof screen size CSS Spoof Ubercookie/ Fake Ubercookie Spoof CSS UUID fingerprint/ Fake CSS UUID fingerprint Avalable for centos, windows. Here is source -> [Hidden Content]
-
Leader of Hacking Group Who Stole $1 Billion From Banks Arrested In Spain
steful replied to topic's m3tal in News
Sad.. -
Sx86 is in stub folder..
-
Bomerang keylogger. (23.04.18) About : The keylogger is composed by 2 files Logger.exe and Injector.dll. The Logger.exe is combination of win elevation exploit and a reflecrive dll loader. 1) Logger.exe abuse of 0day vulnerability to get NT AUTHORITY\SYSTEM. (not tested on win 10) 2) Inject Injector.dll in Winlogon.exe process. The Injector.dll logs keystrokes from every user that logs on computer. 1) Once Injected Debug_Priv function check for valid privs. 2) If done, The keylogger will logs store keylogs at C://here.txt Statut : The stuff is fud for this time. --------------------------------------------------------------------------------- Enjoy : -> [Hidden Content]