Search the Community

Showing results for tags 'source code'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Location


Interests


Occupation


TeamViewer


Tox

Found 58 results

  1. dEEpEst

    source code ExtremeDumper

    ExtremeDumper .NET Assembly Dumper based on MegaDumper [Hidden Content]
  2. dEEpEst

    source code MegaDumper

    MegaDumper Dump native and .NET assemblies [Hidden Content]
  3. dEEpEst

    source code OpenBullet

    OpenBullet is a webtesting suite that allows to perform requests towards a target webapp and offers a lot of tools to work with the results. This software can be used for scraping and parsing data, automated pentesting, unit testing through selenium and much more. IMPORTANT! Performing (D)DoS attacks or credential stuffing on sites you do not own (or you do not have permission to test) is illegal! The developer will not be held responsible for improper use of this software. Here you can find the complete documentation for usage, config making and the RuriLib API. The OpenBullet API was released. It can be used to host configs remotely on your server and have OpenBullet download them upon Rescan. It's very useful to always have updated configs between different computers or people. You can learn more about it here. Found a bug? Create an issue! How to build Make sure you have installed the .NET framework (dev) 4.6.1 (I will retarget to a more recent one soon). Clone this repository and open the solution file with Visual Studio. Switch to Release mode for a much cleaner output. Build the solution (Visual Studio will fetch all the missing nuget packages). You can find the executables inside the folders OpenBullet/bin/Release and OpenBulletCLI/bin/Release. [Hidden Content]
  4. [Hidden Content]
  5. dEEpEst

    Kryptos Private Crypter

    Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  6. dEEpEst

    Enkryption Klein2 Crypter

    Downlooad: [HIDE][Hidden Content]] Password: level23hacktools.com
  7. dEEpEst

    source code USB Trojan

    USB Trojan Super simple loader that spreads over removable drives (USB flash drives, portable and network drives, SD cards). Features You can add the HWID of your PC to the black list and trojan will ignore it You can add any payload (executable file) Slient work Structure of the program Program.cs - Main part of the program HWID.cs - HWID generator Config.cs - Configuration file Shortcut.cs - This class creates shortcuts Tools.cs - Tools for trojan (net utils, and your payload) USB.cs - Infects disks and manages files Build Open Config.cs and edit HWID settings. Open Tools.cs, go to 50 line and modify RunPayload(object) method. Use Visual Studio 2015 or 2017 to build this project Download: [HIDE]. [Hidden Content]]
  8. Briefly about the main thing : DarkSky - Botnet, which contains a convenient interface for management, effective and convenient functionality, including: 3 types of DDoS attacks, functions for downloading / uploading / launching any files from all victims in your control panel. The control panel - was developed for tough combat conditions and high traffic volumes. Thanks to modern technologies, the panel has functions to protect against external influences on it, you can notbeafraid that the abuses will find you. This was checked by 3 months, not a single complaint was made to the hosting companies, not one client. 5000r. + Source code + Updates at least a year + I will open a way to add payload (to bypass AB) Bot functionality: + Protection from bot scanning programs: Wireshark, HTTPAnalyzer, ProcessHacker, MonitorTraffic and also continue this list. + HTTP Flood (Reset TCP Flags) - if you read the specification of the protocol tcp, then to perform the load, you need to reset the connection without waiting for a response from the server, this method is used for DDoS attacks on sites. + HTTP Flood (ARMA Method) - synchronizes all active threads and connections among themselves, waits until the request is sent and closes connections, i.e. at the same time sends a bunch of requests on level with all bots ... + SYN Flood - works on two, the above-described mode and waits until the server returns a response. + UDP Flood - sends huge, randomized packets + Additional Loader, if there is no build from the botnet on the PC, this "loader" will load the build (ie recover) + Main Loader - loads and starts the file. + In the panel, you can specify the time for the bots to be banned. + Uninstall build on bots in 1 click in the panel. + Running Proxy servers with different types of HTTP / S, Socks 4/5 with login or password for authorization. + Functions for unloading any files from the victim with the PC, and sending them to the panel. + Functions for working with memory, turning off DEP mode - for writing to memory. + Bypass to bypass UAC'a, works on WinXP. + Exploit SMB (I can include) Download: [hide][Hidden Content]] Password: level23hacktools.com
  9. dEEpEst

    Dragon Crypter

    Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  10. Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  11. dEEpEst

    Delta Crypter

    Download: [HIDE][Hidden Content]] Password: level23hacktoola.com
  12. dEEpEst

    LimeLoader

    [Hidden Content]
  13. PACE PACE is a Remote Access Tool for Windows. Download: [Hidden Content]
  14. dEEpEst

    source code DigiSparkStealer

    DigiSparkStealer This project allows you to steal passwords and cookies of the victim by inserting a Digispark Attiny85 with this software and after 30 seconds you have all the data in gmail. Just plug BadUSB and get all data) Download: [Hidden Content]
  15. dEEpEst

    source code Lime Miner v0.3

    README.md Lime Miner v0.3 Main Features .NET - Coded in Visual Basic .NET, required framework 4.0 dependency. Codedom - No need for external library to compile Injection - Hide payload behind a legit process "explorer.exe" Prerequisites To open project you need: 1- Visual Studio 2017+ 2- This repository Downlooad [hide][Hidden Content]]
  16. Minimal-Bitcoin-Miner A very simple CPU based Bitcoin Miner in C#. Uses the GETWORK protocol to connect to pool. A great reference implementation if you are trying to understand how Bitcoin mining works. using System; using System.Collections.Generic; using System.Linq; using System.Text; using System.Net; using System.IO; using System.Text.RegularExpressions; using System.Security.Cryptography; namespace MiniMiner { class Utils { public static byte[] ToBytes(string input) { byte[] bytes = new byte[input.Length / 2]; for (int i = 0, j = 0; i < input.Length; j++, i += 2) bytes[j] = byte.Parse(input.Substring(i, 2), System.Globalization.NumberStyles.HexNumber); return bytes; } public static string ToString(byte[] input) { string result = ""; foreach (byte b in input) result += b.ToString("x2"); return result; } public static string ToString(uint value) { string result = ""; foreach (byte b in BitConverter.GetBytes(value)) result += b.ToString("x2"); return result; } public static string EndianFlip32BitChunks(string input) { //32 bits = 4*4 bytes = 4*4*2 chars string result = ""; for (int i = 0; i < input.Length; i += 8) for (int j = 0; j < 8; j += 2) { //append byte (2 chars) result += input[i - j + 6]; result += input[i - j + 7]; } return result; } public static string RemovePadding(string input) { //payload length: final 64 bits in big-endian - 0x0000000000000280 = 640 bits = 80 bytes = 160 chars return input.Substring(0, 160); } public static string AddPadding(string input) { //add the padding to the payload. It never changes. return input + "000000800000000000000000000000000000000000000000000000000000000000000000000000000000000080020000"; } } class Work { public Work(byte[] data) { Data = data; Current = (byte[])data.Clone(); _nonceOffset = Data.Length - 4; _ticks = DateTime.Now.Ticks; _hasher = new SHA256Managed(); } private SHA256Managed _hasher; private long _ticks; private long _nonceOffset; public byte[] Data; public byte[] Current; internal bool FindShare(ref uint nonce, uint batchSize) { for(;batchSize > 0; batchSize--) { BitConverter.GetBytes(nonce).CopyTo(Current, _nonceOffset); byte[] doubleHash = Sha256(Sha256(Current)); //count trailing bytes that are zero int zeroBytes = 0; for (int i = 31; i >= 28; i--, zeroBytes++) if(doubleHash[i] > 0) break; //standard share difficulty matched! (target:ffffffffffffffffffffffffffffffffffffffffffffffffffffffff00000000) if(zeroBytes == 4) return true; //increase if(++nonce == uint.MaxValue) nonce = 0; } return false; } private byte[] Sha256(byte[] input) { byte[] crypto = _hasher.ComputeHash(input, 0, input.Length); return crypto; } public byte[] Hash { get { return Sha256(Sha256(Current)); } } public long Age { get { return DateTime.Now.Ticks - _ticks; } } } class Pool { public Uri Url; public string User; public string Password; public Pool(string login) { int urlStart = login.IndexOf('@'); int passwordStart = login.IndexOf(':'); string user = login.Substring(0, passwordStart); string password = login.Substring(passwordStart + 1, urlStart - passwordStart - 1); string url = "[Hidden Content](urlStart + 1); Url = new Uri(url); User = user; Password = password; } private string InvokeMethod(string method, string paramString = null) { HttpWebRequest webRequest = (HttpWebRequest)WebRequest.Create(Url); webRequest.Credentials = new NetworkCredential(User, Password); webRequest.ContentType = "application/json-rpc"; webRequest.Method = "POST"; string jsonParam = (paramString != null) ? "\"" + paramString + "\"" : ""; string request = "{\"id\": 0, \"method\": \"" + method + "\", \"params\": [" + jsonParam + "]}"; // serialize json for the request byte[] byteArray = Encoding.UTF8.GetBytes(request); webRequest.ContentLength = byteArray.Length; using (Stream dataStream = webRequest.GetRequestStream()) dataStream.Write(byteArray, 0, byteArray.Length); string reply = ""; using (WebResponse webResponse = webRequest.GetResponse()) using (Stream str = webResponse.GetResponseStream()) using (StreamReader reader = new StreamReader(str)) reply = reader.ReadToEnd(); return reply; } public Work GetWork(bool silent = false) { return new Work(ParseData(InvokeMethod("getwork"))); } private byte[] ParseData(string json) { Match match = Regex.Match(json, "\"data\": \"([A-Fa-f0-9]+)"); if (match.Success) { string data = Utils.RemovePadding(match.Groups[1].Value); data = Utils.EndianFlip32BitChunks(data); return Utils.ToBytes(data); } throw new Exception("Didn't find valid 'data' in Server Response"); } public bool SendShare(byte[] share) { string data = Utils.EndianFlip32BitChunks(Utils.ToString(share)); string paddedData = Utils.AddPadding(data); string jsonReply = InvokeMethod("getwork", paddedData); Match match = Regex.Match(jsonReply, "\"result\": true"); return match.Success; } } class Program { static Pool _pool = null; static Work _work = null; static uint _nonce = 0; static long _maxAgeTicks = 20000 * TimeSpan.TicksPerMillisecond; static uint _batchSize = 100000; static void Main(string[] args) { while (true) { try { _pool = SelectPool(); _work = GetWork(); while (true) { if (_work == null || _work.Age > _maxAgeTicks) _work = GetWork(); if (_work.FindShare(ref _nonce, _batchSize)) { SendShare(_work.Current); _work = null; } else PrintCurrentState(); } } catch (Exception e) { Console.WriteLine(); Console.Write("ERROR: "); Console.WriteLine(e.Message); } Console.WriteLine(); Console.Write("Hit 'Enter' to try again..."); Console.ReadLine(); } } private static void ClearConsole() { Console.Clear(); Console.WriteLine("*****************************"); Console.WriteLine("*** Minimal Bitcoin Miner ***"); Console.WriteLine("*****************************"); Console.WriteLine(); } private static Pool SelectPool() { ClearConsole(); Print("Chose a Mining Pool 'user:password@url:port' or leave empty to skip."); Console.Write("Select Pool: "); string login = ReadLineDefault("lithander_2:foo@btcguild.com:8332"); return new Pool(login); } private static Work GetWork() { ClearConsole(); Print("Requesting Work from Pool..."); Print("Server URL: " + _pool.Url.ToString()); Print("User: " + _pool.User); Print("Password: " + _pool.Password); return _pool.GetWork(); } private static void SendShare(byte[] share) { ClearConsole(); Print("*** Found Valid Share ***"); Print("Share: " + Utils.ToString(_work.Current)); Print("Nonce: " + Utils.ToString(_nonce)); Print("Hash: " + Utils.ToString(_work.Hash)); Print("Sending Share to Pool..."); if (_pool.SendShare(share)) Print("Server accepted the Share!"); else Print("Server declined the Share!"); Console.Write("Hit 'Enter' to continue..."); Console.ReadLine(); } private static DateTime _lastPrint = DateTime.Now; private static void PrintCurrentState() { ClearConsole(); Print("Data: " + Utils.ToString(_work.Data)); string current = Utils.ToString(_nonce); string max = Utils.ToString(uint.MaxValue); double progress = ((double)_nonce / uint.MaxValue) * 100; Print("Nonce: " + current + "/" + max + " " + progress.ToString("F2") + "%"); Print("Hash: " + Utils.ToString(_work.Hash)); TimeSpan span = DateTime.Now - _lastPrint; Print("Speed: " + (int)(((_batchSize) / 1000) / span.TotalSeconds) + "Kh/s"); _lastPrint = DateTime.Now; } private static void Print(string msg) { Console.WriteLine(msg); Console.WriteLine(); } private static string ReadLineDefault(string defaultValue) { //Allow Console.ReadLine with a default value string userInput = Console.ReadLine(); Console.WriteLine(); if (userInput == "") return defaultValue; else return userInput; } } } Source: [HIDE][Hidden Content]]
  17. dEEpEst

    source code NxRansomware

    Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  18. dEEpEst

    source code My Little Ransom

    Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  19. Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  20. Download: [HIDE][Hidden Content]] Passwoord: level23hacktools.com
  21. [Hidden Content]
  22. [Hidden Content]
  23. Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  24. Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  25. dEEpEst

    C# R.A.T

    C# R.A.T Server This is the server program of the c# R.A.T. You will need to run this program on your computer, and not on the target's machine. The targets will connect to you with the help of this program. This is not a virus but serval AV will flag it as it's a virus. You need to build your own binary from this source code, so no trust issues. The executable is NOT published on this site, if you want the .exe you have to build the project using Visual Studio. The .dll files are published, because the project will not start without them. You need to select allow if the firewall prompt window come's up or the program can't open the TCP Server. Contains the basic features like: Remote Desktop Keylogger Mic and Cam spy DDoS Fun menu Remote cmd prompt Process manager File manager Plugin Support UAC Bypass Probing Methods This software is open source, you can use the code, or pieces of it in your own project. Or you can just use my project and change the needed values. C# R.A.T Client This is the client version of the c# R.A.T This will run on the target's machine and will connect to your machine via Tcp/IP You will need to download R.A.T Server to your computer to accept incoming clients This client depedns on .NET Framework, and windows. Planning to extend to various platforms like: Android Linux Browser (JS Botnet) HTTP Server (via php backdoors, node modules, python modules etc.) Some of the R.A.T Features are: Keylogger Remote Desktop Mic And Cam Spy Remote Cmd Prompt Process and File manager Fun Menu (hiding Desktop icons, Clock, Taskbar, showing messagebox, triggering windows sound effects) DDoS with target validation Password manager (supporting: Internet Explorer, Google Chrome, Firefox) Firefox password harvesting depends on NirSoft password fox. Other two browsers are implemented in the code. I plan to add more features like: Scripting (Server side plugins can do this) Dns Server spoofing using c# Dns Server Proxy Server (for web content modification) Pivoting (infecting other machines in the local network) Registry editing Windows System password phising attack Probing methods (for ex. start at system start, prevent from deleting file, maybe get UAC elevated) Hiding program on start (Available as an opt-in) Maybe http/s server for browser clients (See JS Botnet server plugin) Support for resolving Dns to ipv4 address Connect to linux server And only use this on other peoples machine if you have thier permission, otherwise you can test it on a VM (Virtul Machine) This is not a dangerous virus so if you start it on your own machine and don't send any commands from the server you can safely just close the program like nothing happend Download server:[Hidden Content] Download client:[Hidden Content]