Search the Community

Showing results for tags '(cracked)'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin
  • Null3D's Nulled Group


There are no results to display.

There are no results to display.

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start



About Me










Found 9 results

  1. Download: [HIDE][Hidden Content]] Password:
  2. dEEpEst

    RDP Brute (Cracked)

    Download: [HIDE][Hidden Content]] Password:
  3. dEEpEst

    Discord Spy Tool (Cracked)

    Download: [HIDE][Hidden Content]] Password:
  4. dEEpEst

    Titan Crypter (Cracked)

    Download: [HIDE][Hidden Content]] Password:
  5. dEEpEst

    Atomic Email Hunter (Cracked)

    All the info here: Download: [hide][Hidden Content]] Password:
  6. Download: [hide][Hidden Content]] Password: in user to put anything.
  7. dEEpEst

    Proton RAT v1.0.0.6 (Cracked)

    The real threat behind the software is this: The malware is shipped with genuine Apple code-signing signatures. This means the author of Proton RAT somehow got through the rigorous filtration process Apple places on MAC OS developers of third-party software and obtained genuine certifications for his program. Sixgill evaluates that the malware developer has managed to falsify registration to the Apple Developer ID Program or used stolen developer credentials for the purpose. Sixgill also believes that gaining root privileges on MAC OS is only possible by employing a previously unpatched 0-day vulnerability, which is suspected to be in possession of the author. Proton’s users then perform the necessary action of masquerading the malicious app as a genuine one, including a custom icon and name. The victim is then tricked into downloading and installing Proton. CAPABILITIES The malware in native Objective C, the advantage is that the malware does not require any dependencies. The author also claims the app is fully-undetected by any existing MAC OS anti-viruses currently in the market. He then continues to mention a comprehensive list of capabilities: Execute any bash command under root Monitor keystrokes (we even have tariff allowing to log passwords) Get notified each time your clients enters something Upload files to remote machine Download files from remote machine Connect directly via SSH/VNC to remote machine Get screenshots/webcam shots Satisfy gatekeeper bu choosing signed bundle Develop your own panel/program, bundle with our extensive API Get updates on the air and much more... Download: [hide][Hidden Content]] Password:
  8. dEEpEst

    888 Private RAT (Cracked)

    Native --------- Work Win ( 7 - 8 - 8.1 - 10 -xp -Vista - 2000 - 98 - 95 ) 64 & 32 Bit Scanne Feature ——- – Persistence startUp (even if it deleted ) – sleep – hide proccess (32bit) – Usb spread shortCut New method – Upx – spoof any extention (scr) – Disable teskmgr & Msconfig – Av Obfuscator Usg server Fud – Uac Exploit 0 day disable & enable - Bypass AV scanne & Runtime with Unique Stub Generator (USG) - Startup Scheduled - Hide instalation - 2 Costom Builder - Icone changer - Binder any kind of file ilimited & not run in startup Option ——- – File Manager – Remote Desktop – Web cam capture – Sound capture – Get password (all last browser 2 method – nirsoft & Downloader & Outlook) * Browser Firefox Internet Explorer Google Chrome Chrome Canary/SXS CoolNovo Browser Opera Browser Apple Safari Flock Browser SeaMonkey Browser SRWare Iron Browser Comodo Dragon Browser * EMaile Microsoft Outlook Express Microsoft Outlook 2002/XP/2003/2007/2010/2013 Mozilla Thunderbird Windows Live Mail 2012 IncrediMail Opera Mail The Bat! Foxmail v6.x – v7.x Windows Live Messenger MSN Messenger Google Talk GMail Notifier PaltalkScene IM Pidgin (Formerly Gaim) Messenger Miranda Messenger Windows Credential Manager – proccess Manager – remote Cmd – Online Keylogger – Form graber log + images – remote chat – download & execut - Upload & execut – Open Url – Uac exploit – Delete Cookis (chrome + firfox) – Spreaker ( Virus speak what you writ ) – outluk Delete Profile & pass – open cd & close Download: [HIDE][Hidden Content]] Password: