Search the Community

Showing results for tags 'remote'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Premium Accounts
  • Modders Section
  • PRIV8-Section
  • Cracking Zone PRIV8
  • Carding Zone PRIV8

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 278 results

  1. itsMe

    Loki - Remote Access Tool

    Loki Loki is a simple Remote Access Tool. Loki uses RSA-2048 with AES-256 to keep your communication with infected machines secure. Requirements Python 3.6.x | 3.7.x | 3.8.x Server tested on Windows 10 Kali Linux Bot tested on Windows 10 Payload generator tested on Windows 10 Features Upload & Download Chrome Launching Persistence Screenshare Screenshot Keylogger SFTP SSH [HIDE][Hidden Content]]
  2. Venom Software A quality remote administration tool was the top request we had from our macro exploit users, and that’s how Venom Software was born. There’s no easier way to spread your exploit in any environment, and take advantage of remote file management & registry / command access. Sales + Info: [Hidden Content] [Hidden Content] Tutorial Hidden Remote Desktop HRDP [Hidden Content] Tutorial Hidden Remote Desktop VNC [Hidden Content] Tested by Me / itsMe Download: [HIDE][Hidden Content]] Server Scan [Hidden Content]
  3. Functions Desktop Capture Webcam Capture Sound Capture Computer Power Shutdown Restart Logoff BSoD Startup Management Add to Autorun Uninstall Files Manager Current Directory List of Files Remove a File Remove all Files Upload File Download File Run File Run File as Administrator Process Manager Process list Process Kill Kill all Processes Disable Task Manager Send Message Speak Message Open URL Set wallpapers ForkBomb Get Passwords Get Cookies Get History Clipboard editing Block Input Remote Shell Navigation buttons Bugs fixed / Input blocking added / Process protection added [HIDE][Hidden Content]]
  4. DiscordRAT Discord Remote Administration Tool fully written in Python3. This is a RAT controlled over Discord with over 20 post exploitation modules. Disclaimer: This tool is for educational use only, the author will not be held responsible for any misuse of this tool. This is my first project on github as such this project is far from perfect , I will listen to any criticism as long as it is constructive. Setup Guide: You will first need to register a bot with the Discord developper portal and then add the bot to the server that you want. Once the bot is created copy the token of your bot and paste it at line 11. Now on go on discord , go to the settings , go to appearance , scroll to the bottom , and activate "Developer Mode",now go to the server where your bot added right click on the channel where you want the bot to post , click copy ID and finally , paste the ID in the parenthesis in line 99. Install requirements ("pip3 install -r requirements.txt") Then if steps above were succesful after launching the python file, or executable , it will post a message on the server with a generated uuid , all that is left to do is posting "!interact " with the given uuid. Now your bot should be available to use ! Requirements: Python3,Windows Compiling to exe (optional): If you want to compile the bot to exe you can use PyInstaller. Inside the directory of the bot execute "PyInstaller --onefile --noconsole DiscordRAT.py" or "python3 -m PyInstaller --onefile --noconsole DiscordRAT(NoCV).py (or DiscordRAT.py)" If an error occured during compiling try to import the discord module "PyInstaller --onefile --noconsole --hidden-import=discord DiscordRAT.py" Advice: If you have problems with the installation of win32api or other modules , try installing it in a python virtual environment. There are two python files one has opencv and webcam related modules the other does not, this has been done because open-cv adds multiple dozens of megabytes to the compiled .exe file. [HIDE][Hidden Content]]
  5. Functions: ComputerInfo, BatteryInfo, Location, Whois, ActiveWindow, Webcam, Microphone, Desktop, Keylogger, ClipboardSet, ClipboardGet, ProcessList, ProcessKill, ProcessStart, GetPasswords, GetCreditCards, GetHistory, GetBookmarks, GetCookies, OpenCD, CloseCD, DownloadFile, UploadFile, RunFile, RunFileAdmin, ListFiles, RemoveFile, RemoveDir, MoveFile, MoveDir, CopyFile, CopyDir, Speak, Shell, MessageBox, OpenURL, SendKeyPress, ScanNetwork, SetWallPaper, BlockInput, Monitor(off/on), DisplayRotate, ForkBomb, BsoD, Shutdown, Reboot, Hibernate, Logoff, Help, About, Uninstall. [HIDE][Hidden Content]]
  6. qi wang

    I want to buy remote management

    Hello, I need to buy a set of remote RATs that support Windows and Linux, and can run on Windows contact details ICQ: @Seczone Email: [email protected]
  7. WhatsRCE This is a Automated Generate Payload for CVE-2019-11932 (WhatsApp Remote Code Execution) Auto install GCC (no harm command, you can see this is open-source) Saving to .GIF file How To Use ? [Hidden Content]
  8. Stitch - Python Remote Administration Tool (RAT) A Cross Platform Python Remote Administration Tool: This is a cross platform python framework which allows you to build custom payloads for Windows, Mac OSX and Linux as well. You are able to select whether the payload binds to a specific IP and port, listens for a connection on a port, option to send an email of system info when the system boots, and option to start keylogger on boot. Payloads created can only run on the OS that they were created on. [Hidden Content]
  9. Info: [HIDE][Hidden Content]] # Current Version: 1.2.0.0 ############################################## # ############################################## 1.2.0.0 - Added the Assembly Changer and Icon Changer. - Updated installation method. - Updated dynamic stub library. 1.1.0.0 - Added process manager protection. - Added ip logger function. - Added dynamic stub library. 1.0.0.1 - Fix single instance issue. - Fix the encryption error on mutex. Server Scan [Hidden Content]
  10. BlueKeep CVE-2019-0708 is a critical Remote Code Execution vulnerability in Microsoft’s RDP service. This only targets Windows 2008 R2 and Windows 7 SP1. [Hidden Content]
  11. Apache Solr version 8.2.0 suffers from a remote code execution vulnerability. View the full article
  12. This Metasploit module exploits a remote command execution vulnerability in Nostromo versions 1.9.6 and below. This issue is caused by a directory traversal in the function http_verify in nostromo nhttpd allowing an attacker to achieve remote code execution via a crafted HTTP request. View the full article
  13. This Metasploit module exploits a command injection vulnerability in Ajenti versions 2.1.31 and below. By injecting a command into the username POST parameter to api/core/auth, a shell can be spawned. View the full article
  14. Microsoft Windows Server 2012 suffers from a Group Policy remote code execution vulnerability. View the full article
  15. rConfig version 3.9.2 suffers from a remote code execution vulnerability. View the full article
  16. 1337day-Exploits

    PHP-FPM Remote Code Execution

    This is a newer method to exploit php-fpm to achieve remote code execution when certain nginx with php-fpm configurations exist. View the full article
  17. This Metasploit module exploits a PHP object injection vulnerability in Joomla version 3.4.6. View the full article
  18. Trend Micro Anti-Threat Toolkit (ATTK) versions 1.62.0.1218 and below suffer from a remote code execution vulnerability. View the full article
  19. Whatsapp version 2.19.216 suffers from a remote code execution vulnerability. View the full article
  20. Zilab Remote Console Server version 3.2.9 suffers from a zrcs unquoted service path vulnerability. View the full article
  21. Remote exploit for Podman when configured with Varlink that allows for remote command execution, denial of service, directory traversal, and information disclosure vulnerabilities. View the full article
  22. WeDefend - Check Proccess and Network Activity to against Remote Access Trojan WeDefend is application based on java programming language with several features as check proccess activity, network activity, file encryption, disk hider and folder lock to against and also protect user data from Remote Access Trojan malware in Windows operating system. Video: [Hidden Content] Download: [Hidden Content]
  23. Visual Studio Code enables its remote debugger by default when installed. View the full article
  24. 1337day-Exploits

    Ajenti Remote Command Execution

    Ajenti suffers from a remote command execution vulnerability. View the full article
  25. MiniShare version 1.4.1 CONNECT remote buffer overflow exploit. View the full article