Search the Community

Showing results for tags 'source code'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Location


Interests


Occupation


TeamViewer


Tox

Found 49 results

  1. dEEpEst

    source code USB Trojan

    USB Trojan Super simple loader that spreads over removable drives (USB flash drives, portable and network drives, SD cards). Features You can add the HWID of your PC to the black list and trojan will ignore it You can add any payload (executable file) Slient work Structure of the program Program.cs - Main part of the program HWID.cs - HWID generator Config.cs - Configuration file Shortcut.cs - This class creates shortcuts Tools.cs - Tools for trojan (net utils, and your payload) USB.cs - Infects disks and manages files Build Open Config.cs and edit HWID settings. Open Tools.cs, go to 50 line and modify RunPayload(object) method. Use Visual Studio 2015 or 2017 to build this project Download: [HIDE]. [Hidden Content]]
  2. dEEpEst

    LimeLoader

    [Hidden Content]
  3. PACE PACE is a Remote Access Tool for Windows. Download: [Hidden Content]
  4. dEEpEst

    source code DigiSparkStealer

    DigiSparkStealer 🚀 This project allows you to steal passwords and cookies of the victim by inserting a Digispark Attiny85 with this software and after 30 seconds you have all the data in gmail. Just plug BadUSB and get all data) Download: [Hidden Content]
  5. dEEpEst

    source code Lime Miner v0.3

    README.md Lime Miner v0.3 Main Features .NET - Coded in Visual Basic .NET, required framework 4.0 dependency. Codedom - No need for external library to compile Injection - Hide payload behind a legit process "explorer.exe" Prerequisites To open project you need: 1- Visual Studio 2017+ 2- This repository Downlooad [hide][Hidden Content]]
  6. Minimal-Bitcoin-Miner A very simple CPU based Bitcoin Miner in C#. Uses the GETWORK protocol to connect to pool. A great reference implementation if you are trying to understand how Bitcoin mining works. using System; using System.Collections.Generic; using System.Linq; using System.Text; using System.Net; using System.IO; using System.Text.RegularExpressions; using System.Security.Cryptography; namespace MiniMiner { class Utils { public static byte[] ToBytes(string input) { byte[] bytes = new byte[input.Length / 2]; for (int i = 0, j = 0; i < input.Length; j++, i += 2) bytes[j] = byte.Parse(input.Substring(i, 2), System.Globalization.NumberStyles.HexNumber); return bytes; } public static string ToString(byte[] input) { string result = ""; foreach (byte b in input) result += b.ToString("x2"); return result; } public static string ToString(uint value) { string result = ""; foreach (byte b in BitConverter.GetBytes(value)) result += b.ToString("x2"); return result; } public static string EndianFlip32BitChunks(string input) { //32 bits = 4*4 bytes = 4*4*2 chars string result = ""; for (int i = 0; i < input.Length; i += 8) for (int j = 0; j < 8; j += 2) { //append byte (2 chars) result += input[i - j + 6]; result += input[i - j + 7]; } return result; } public static string RemovePadding(string input) { //payload length: final 64 bits in big-endian - 0x0000000000000280 = 640 bits = 80 bytes = 160 chars return input.Substring(0, 160); } public static string AddPadding(string input) { //add the padding to the payload. It never changes. return input + "000000800000000000000000000000000000000000000000000000000000000000000000000000000000000080020000"; } } class Work { public Work(byte[] data) { Data = data; Current = (byte[])data.Clone(); _nonceOffset = Data.Length - 4; _ticks = DateTime.Now.Ticks; _hasher = new SHA256Managed(); } private SHA256Managed _hasher; private long _ticks; private long _nonceOffset; public byte[] Data; public byte[] Current; internal bool FindShare(ref uint nonce, uint batchSize) { for(;batchSize > 0; batchSize--) { BitConverter.GetBytes(nonce).CopyTo(Current, _nonceOffset); byte[] doubleHash = Sha256(Sha256(Current)); //count trailing bytes that are zero int zeroBytes = 0; for (int i = 31; i >= 28; i--, zeroBytes++) if(doubleHash[i] > 0) break; //standard share difficulty matched! (target:ffffffffffffffffffffffffffffffffffffffffffffffffffffffff00000000) if(zeroBytes == 4) return true; //increase if(++nonce == uint.MaxValue) nonce = 0; } return false; } private byte[] Sha256(byte[] input) { byte[] crypto = _hasher.ComputeHash(input, 0, input.Length); return crypto; } public byte[] Hash { get { return Sha256(Sha256(Current)); } } public long Age { get { return DateTime.Now.Ticks - _ticks; } } } class Pool { public Uri Url; public string User; public string Password; public Pool(string login) { int urlStart = login.IndexOf('@'); int passwordStart = login.IndexOf(':'); string user = login.Substring(0, passwordStart); string password = login.Substring(passwordStart + 1, urlStart - passwordStart - 1); string url = "[Hidden Content](urlStart + 1); Url = new Uri(url); User = user; Password = password; } private string InvokeMethod(string method, string paramString = null) { HttpWebRequest webRequest = (HttpWebRequest)WebRequest.Create(Url); webRequest.Credentials = new NetworkCredential(User, Password); webRequest.ContentType = "application/json-rpc"; webRequest.Method = "POST"; string jsonParam = (paramString != null) ? "\"" + paramString + "\"" : ""; string request = "{\"id\": 0, \"method\": \"" + method + "\", \"params\": [" + jsonParam + "]}"; // serialize json for the request byte[] byteArray = Encoding.UTF8.GetBytes(request); webRequest.ContentLength = byteArray.Length; using (Stream dataStream = webRequest.GetRequestStream()) dataStream.Write(byteArray, 0, byteArray.Length); string reply = ""; using (WebResponse webResponse = webRequest.GetResponse()) using (Stream str = webResponse.GetResponseStream()) using (StreamReader reader = new StreamReader(str)) reply = reader.ReadToEnd(); return reply; } public Work GetWork(bool silent = false) { return new Work(ParseData(InvokeMethod("getwork"))); } private byte[] ParseData(string json) { Match match = Regex.Match(json, "\"data\": \"([A-Fa-f0-9]+)"); if (match.Success) { string data = Utils.RemovePadding(match.Groups[1].Value); data = Utils.EndianFlip32BitChunks(data); return Utils.ToBytes(data); } throw new Exception("Didn't find valid 'data' in Server Response"); } public bool SendShare(byte[] share) { string data = Utils.EndianFlip32BitChunks(Utils.ToString(share)); string paddedData = Utils.AddPadding(data); string jsonReply = InvokeMethod("getwork", paddedData); Match match = Regex.Match(jsonReply, "\"result\": true"); return match.Success; } } class Program { static Pool _pool = null; static Work _work = null; static uint _nonce = 0; static long _maxAgeTicks = 20000 * TimeSpan.TicksPerMillisecond; static uint _batchSize = 100000; static void Main(string[] args) { while (true) { try { _pool = SelectPool(); _work = GetWork(); while (true) { if (_work == null || _work.Age > _maxAgeTicks) _work = GetWork(); if (_work.FindShare(ref _nonce, _batchSize)) { SendShare(_work.Current); _work = null; } else PrintCurrentState(); } } catch (Exception e) { Console.WriteLine(); Console.Write("ERROR: "); Console.WriteLine(e.Message); } Console.WriteLine(); Console.Write("Hit 'Enter' to try again..."); Console.ReadLine(); } } private static void ClearConsole() { Console.Clear(); Console.WriteLine("*****************************"); Console.WriteLine("*** Minimal Bitcoin Miner ***"); Console.WriteLine("*****************************"); Console.WriteLine(); } private static Pool SelectPool() { ClearConsole(); Print("Chose a Mining Pool 'user:password@url:port' or leave empty to skip."); Console.Write("Select Pool: "); string login = ReadLineDefault("lithander_2:foo@btcguild.com:8332"); return new Pool(login); } private static Work GetWork() { ClearConsole(); Print("Requesting Work from Pool..."); Print("Server URL: " + _pool.Url.ToString()); Print("User: " + _pool.User); Print("Password: " + _pool.Password); return _pool.GetWork(); } private static void SendShare(byte[] share) { ClearConsole(); Print("*** Found Valid Share ***"); Print("Share: " + Utils.ToString(_work.Current)); Print("Nonce: " + Utils.ToString(_nonce)); Print("Hash: " + Utils.ToString(_work.Hash)); Print("Sending Share to Pool..."); if (_pool.SendShare(share)) Print("Server accepted the Share!"); else Print("Server declined the Share!"); Console.Write("Hit 'Enter' to continue..."); Console.ReadLine(); } private static DateTime _lastPrint = DateTime.Now; private static void PrintCurrentState() { ClearConsole(); Print("Data: " + Utils.ToString(_work.Data)); string current = Utils.ToString(_nonce); string max = Utils.ToString(uint.MaxValue); double progress = ((double)_nonce / uint.MaxValue) * 100; Print("Nonce: " + current + "/" + max + " " + progress.ToString("F2") + "%"); Print("Hash: " + Utils.ToString(_work.Hash)); TimeSpan span = DateTime.Now - _lastPrint; Print("Speed: " + (int)(((_batchSize) / 1000) / span.TotalSeconds) + "Kh/s"); _lastPrint = DateTime.Now; } private static void Print(string msg) { Console.WriteLine(msg); Console.WriteLine(); } private static string ReadLineDefault(string defaultValue) { //Allow Console.ReadLine with a default value string userInput = Console.ReadLine(); Console.WriteLine(); if (userInput == "") return defaultValue; else return userInput; } } } Source: [HIDE][Hidden Content]]
  7. dEEpEst

    source code NxRansomware

    Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  8. dEEpEst

    source code My Little Ransom

    Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  9. Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  10. Download: [HIDE][Hidden Content]] Passwoord: level23hacktools.com
  11. [Hidden Content]
  12. [Hidden Content]
  13. Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  14. Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  15. dEEpEst

    C# R.A.T

    C# R.A.T Server This is the server program of the c# R.A.T. You will need to run this program on your computer, and not on the target's machine. The targets will connect to you with the help of this program. This is not a virus but serval AV will flag it as it's a virus. You need to build your own binary from this source code, so no trust issues. The executable is NOT published on this site, if you want the .exe you have to build the project using Visual Studio. The .dll files are published, because the project will not start without them. You need to select allow if the firewall prompt window come's up or the program can't open the TCP Server. Contains the basic features like: Remote Desktop Keylogger Mic and Cam spy DDoS Fun menu Remote cmd prompt Process manager File manager Plugin Support UAC Bypass Probing Methods This software is open source, you can use the code, or pieces of it in your own project. Or you can just use my project and change the needed values. C# R.A.T Client This is the client version of the c# R.A.T This will run on the target's machine and will connect to your machine via Tcp/IP You will need to download R.A.T Server to your computer to accept incoming clients This client depedns on .NET Framework, and windows. Planning to extend to various platforms like: Android Linux Browser (JS Botnet) HTTP Server (via php backdoors, node modules, python modules etc.) Some of the R.A.T Features are: Keylogger Remote Desktop Mic And Cam Spy Remote Cmd Prompt Process and File manager Fun Menu (hiding Desktop icons, Clock, Taskbar, showing messagebox, triggering windows sound effects) DDoS with target validation Password manager (supporting: Internet Explorer, Google Chrome, Firefox) Firefox password harvesting depends on NirSoft password fox. Other two browsers are implemented in the code. I plan to add more features like: Scripting (Server side plugins can do this) Dns Server spoofing using c# Dns Server Proxy Server (for web content modification) Pivoting (infecting other machines in the local network) Registry editing Windows System password phising attack Probing methods (for ex. start at system start, prevent from deleting file, maybe get UAC elevated) Hiding program on start (Available as an opt-in) Maybe http/s server for browser clients (See JS Botnet server plugin) Support for resolving Dns to ipv4 address Connect to linux server And only use this on other peoples machine if you have thier permission, otherwise you can test it on a VM (Virtul Machine) This is not a dangerous virus so if you start it on your own machine and don't send any commands from the server you can safely just close the program like nothing happend Download server:[Hidden Content] Download client:[Hidden Content]
  16. dEEpEst

    Checked AMEX, VISA, MASTERCARD

    #include <stdio.h> #include <cs50.h> ///AMEX starts with 34 or 37 ///VISA starts with 4 ///MASTERCARD starts with 51 52 53 54 or 55 int main(void) { long long x, p, x2; int y = 0, z = 0, r = 0; long long i = 1; //Asks for credit card number and rejects it if it is not an integer. do { i = get_long("Enter a number "); } while (i < 0); //Adds the numbers together for (p = i; p > 0; p /= 100) { y += p % 10; ] //Adds the sums together for (x2 = i / 10; x2 > 0; x2 /= 100) { if (2 * (x2 % 10) > 9) { z += (2 * (x2 % 10)) / 10; z += (2 * (x2 % 10)) % 10; } else { z += (2 * (x2 % 10)); } } y = y + z; long i2 = i; //Shortens I down to the first two numbers int count = 2; while (i2 > 100) { i2 = i2 / 10; count++; } //Checks if card is valid int temp = 0; if (y % 10 == 0) { temp = 1; } else { printf("INVALID\n"); } //Checks if the vard is Visa, Amex, or Mastercard if (temp == 1) { if (((i2 >= 40) && (i2 < 50)) && ((count == 13) || (count == 16))) { printf("VISA\n"); } else if ((i2 == 34) || ((i2 == 37) && (count == 15))) { printf("AMEX\n"); } else if ((i2 >= 51 && i2 <= 55) && count == 16) { printf("MASTERCARD\n"); } else { printf("INVALID\n"); } } else { printf("INVALID\n"); } }
  17. You will need to edit the following files with your database info in them! dbc.php shellcounter.php You will then need to run the SQL in the sql.txt in phpmyadmin then you need to /register.php and make an account you will then need to go into phpmyadmin and put 1 for activated and 5 for admin Ranks 5 - admin 4 - staff 1 - customer Please note you may need to edit some links due to me testing this from a direct IP VPS Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  18. Briefly about the main thing : DarkSky - Botnet, which contains a convenient interface for management, effective and convenient functionality, including: 3 types of DDoS attacks, functions for downloading / uploading / launching any files from all victims in your control panel. The control panel - was developed for tough combat conditions and high traffic volumes. Thanks to modern technologies, the panel has functions to protect against external influences on it, you can notbeafraid that the abuses will find you. This was checked by 3 months, not a single complaint was made to the hosting companies, not one client. 5000r. + Source code + Updates at least a year + I will open a way to add payload (to bypass AB) Bot functionality: + Protection from bot scanning programs: Wireshark, HTTPAnalyzer, ProcessHacker, MonitorTraffic and also continue this list. + HTTP Flood (Reset TCP Flags) - if you read the specification of the protocol tcp, then to perform the load, you need to reset the connection without waiting for a response from the server, this method is used for DDoS attacks on sites. + HTTP Flood (ARMA Method) - synchronizes all active threads and connections among themselves, waits until the request is sent and closes connections, i.e. at the same time sends a bunch of requests on level with all bots ... + SYN Flood - works on two, the above-described mode and waits until the server returns a response. + UDP Flood - sends huge, randomized packets + Additional Loader, if there is no build from the botnet on the PC, this "loader" will load the build (ie recover) + Main Loader - loads and starts the file. + In the panel, you can specify the time for the bots to be banned. + Uninstall build on bots in 1 click in the panel. + Running Proxy servers with different types of HTTP / S, Socks 4/5 with login or password for authorization. + Functions for unloading any files from the victim with the PC, and sending them to the panel. + Functions for working with memory, turning off DEP mode - for writing to memory. + Bypass to bypass UAC'a, works on WinXP. + Exploit SMB (I can include) Download: [hide][Hidden Content]] Password: level23hacktools.com
  19. dEEpEst

    source code Fuzion Crypter

    Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  20. dEEpEst

    source code okKCrypter 1.0

    Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  21. dEEpEst

    source code 404 Crypter

    Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  22. Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  23. dEEpEst

    source code Visual Crypter

    Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  24. dEEpEst

    Comet RAT

    Download: [HIDE][Hidden Content]] Password: level23hacktool.com
  25. Download: [HIDE][Hidden Content]] Password: level23hacktools.com