Search the Community

Showing results for tags 'access'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 109 results

  1. SterJo NetStalker v.1.4 Having confidential information on your computer requires better care for your PC security. Some program on your computer may send that type information to someone, which you definitely don't want. So it's better to prevent it with a network monitoring software. If you're concerned about your network security, and want to be sure you have the proper PC protection, there is a special program. A solution for your computer protection is called SterJo NetStalker. It is network monitoring software - not a firewall, but makes the same thing for you and works on similar priciples as a firewall. SterJo NetStalker is security software made specially for your PC protection. It will detect all connections to your computer, both authorized and unauthorized, and alert you for every new connection. It is kind of a free firewall - not a classic firewall as we know it, but rather a monitoring software, which will display details about all connections on your PC. Analysing all open ports on your system will be done in less then a second. SterJo NetStalker will also analyse all running processes on your computer. That's especially useful when processes look suspicious, so this free computer protection software will work like a firewall software and inform you when your PC security is threatened. Version History Version 1.4: Some bugs fixed and minor changes. [hide][Hidden Content]]
  2. Table of Contents Connection Dependency Installation And Usage Operating Systems Tested YouTube Tutorials Recommended For Tips Contact Next Update Tabs Shell Application Screen Phone Files Network Fun KeyBoard Payload Root Info Gallery [hide][Hidden Content]]
  3. NullRAT Remote Access Trojan that uses Discord as C&C One of the main things about this RAT is it will be under 8mb, so you can always upload it without nitro That's also why it doesn't have too many features compared to other Discord RATs Features: Find the public IP of the victim Find their Discord token(s) Find victim's approximate location Add payload to startup with one command Take pictures using victim's webcam Take screenshot of victim's PC Download files from victim's PC Upload files to victim's PC Get some information about their PC Execute command prompt commands (Thank you Sp00p) Browse around their PC, see directory contents, and much more It's windows-only by the way; sorry :( Fourth stable release (Upgrade ASAP) This release contains important changes and tweaks You should upgrade right now basically Changes are mentioned in the changelog.md file [hide][Hidden Content]]
  4. Mystikal Mystikal is a macOS payload generator integrated with Mythic. Mystikal leverages Mythic scripting to log in and creates the necessary payload for the selected initial access method. Mystikal creates an Apfell or Leviathan payload depending on the chosen initial access method. A common payload used for initial access is the installer package. These packages are eXtensible ARchiver (XAR) archives that conform to a specific folder structure and have a .pkg file extension. The easy comparison to Windows would be Windows installers which typically have the .msi file extension. As with Windows installers, installer packages execution typically results in an install wizard presented to the end-user for installation. For offensive use, typical installer package execution relies upon preinstall and postinstall scripts, which are simple bash scripts that execute during the installation process. An alternative method depends upon the abuse of JavaScript within distribution Extensible Markup Language (XML) files using InstallerJS. Apple’s InstallerJS is an Application Programming Interface (API) leveraged in distribution XML files to perform installation checks. Within the InstallerJS API is the system.run tag, which can execute system commands. The Silver Sparrow malware recently used this method. By abusing the distribution XML file, attackers can perform the same tasks typically within preinstall / postinstall scripts. The benefit of this method is that it makes it slightly harder to see what actions the installer package is performing. Additionally, due to the invocation time of the distribution XML file, the installer package does not need to finish the installation process for execution to occur. Changelog v2.2.13 Merge pull request #107 from its-a-feature/2.2-updates added in a few more pages for the new ui, updated mythic-cli to include… [hide][Hidden Content]]
  5. Rafel is Remote Access Tool Used to Control Victims Using WebPanel With More Advance Features. Main Features Admin Permission Add App To White List Looks Like Browser Runs In Background Even App is Closed(May not work on some Devices) Accessibility Feature Support Android v5 - v10 No Port Forwarding Needed [hide][Hidden Content]]
  6. Mystikal is a macOS payload generator integrated with Mythic. Mystikal leverages Mythic scripting to log in and creates the necessary payload for the selected initial access method. Mystikal creates an Apfell or Leviathan payload depending on the chosen initial access method. A common payload used for initial access is the installer package. These packages are eXtensible ARchiver (XAR) archives that conform to a specific folder structure and have a .pkg file extension. The easy comparison to Windows would be Windows installers which typically have the .msi file extension. As with Windows installers, installer packages execution typically results in an install wizard presented to the end-user for installation. For offensive use, typical installer package execution relies upon preinstall and postinstall scripts, which are simple bash scripts that execute during the installation process. An alternative method depends upon the abuse of JavaScript within distribution Extensible Markup Language (XML) files using InstallerJS. Apple’s InstallerJS is an Application Programming Interface (API) leveraged in distribution XML files to perform installation checks. Within the InstallerJS API is the system.run tag, which can execute system commands. The Silver Sparrow malware recently used this method. By abusing the distribution XML file, attackers can perform the same tasks typically within preinstall / postinstall scripts. The benefit of this method is that it makes it slightly harder to see what actions the installer package is performing. Additionally, due to the invocation time of the distribution XML file, the installer package does not need to finish the installation process for execution to occur. [hide][Hidden Content]]
  7. wifipumpkin3 is a powerful framework for rogue access point attack, written in Python, that allows and offers to security researchers, red teamers, and reverse engineers to mount a wireless network to conduct a man-in-the-middle attack. Main Features Rogue access point attack Man-in-the-middle attack Rogue Dns Server Captive portal attack (captiveflask) Intercept, inspect, modify and replay web traffic WiFi networks scanning DNS monitoring service Credentials harvesting Transparent Proxies LLMNR, NBT-NS, and MDNS poisoner (Responder3) and more! Changelog v1.0.8 R2 Added added route for getting information of plugins and proxies on restAPI added new attribute on plugins and proxies mode class added logger resource API Removed removed support to Rest API controller temporally Fixed fixed cli error when request restAPI plugins and proxies fixed restApi error when getting exceptions http request fixed wirelesscontroller not started into restAPI mode fixed locale error in docker container [hide][Hidden Content]]
  8. [Hidden Content]
  9. Currently in alpha stage. Features: Multi-Threaded Multi Listeners Packet Serialization Recover Wifi Passwords | Save them Recover Chrome-based WebBrowsers | Save them Recover Chrome-Bases History | Save them Automation Tasks when client is connected Save Settings for automation tasks Loading Animations for Passwords recoveries (Wifi and browsers) , History Recoveries and Tasks Manager Remote Tasks Manager (refresh , kill , resume , pause) Misc Functions : Shutdown , Log Out , Reboot , BSOD , Hibernate , Suspend , Mute Sound , Volume Up , Volume Down Remote Viewer : Image Format : PNG , JPEG , GIG , Change Quality (only JPEG affected) , Time in MS Low Size Stub (28KB) LEGAL DISCLAIMER PLEASE READ! I, the creator and all those associated with the development and production of this program are not responsible for any actions and or damages caused by this software. You bear the full responsibility of your actions and acknowledge that this software was created for educational purposes only. This software's intended purpose is NOT to be used maliciously, or on any system that you do not have own or have explicit permission to operate and use this program on. By using this software, you automatically agree to the above. HorusEyesRat Aka He-Rat is a new remote access tool based on packets serialization. This rat is multi-threaded and partially asynchronous (except to send data => synclock to avoid packet at same time => collision).I will implement most features I've done for SpyBoxRat so consider it as an upgrade of SpyBox ! [hide][Hidden Content]]
  10. wifipumpkin3 is a powerful framework for rogue access point attack, written in Python, that allows and offers to security researchers, red teamers, and reverse engineers to mount a wireless network to conduct a man-in-the-middle attack.wifipumpkin3 Main Features Rogue access point attack Man-in-the-middle attack Rogue Dns Server Captive portal attack (captiveflask) Intercept, inspect, modify and replay web traffic WiFi networks scanning DNS monitoring service Credentials harvesting Transparent Proxies LLMNR, NBT-NS, and MDNS poisoner (Responder3) and more! Changelog v1.0.8 R1 Added added inactivity poll default value to 60 min #67 added check if process hostapd is running before start threads added settings binary path of iptables editable added waitforfinish on Qprocess for add rules iptables added frist restful api implementation added DHCP command to select the dhcp server configuration added stop all modules with the command stop or exit is running added new module for performing dns spoof attack with AP enable Removed removed dependencies that be standard library #105 Fixed fixed hide error object of type QProcess on WorkProcess class #93 fixed settings dhcp for allow to change dhcp configuration fixed error when execute from github actions fixed set restport by default 1337 fixed process init hostapd duplicated fixed clean code and code format improves fixed github actions error when try to run pytests fixed dhcp command for apply configurations on same session [hide][Hidden Content]]
  11. KEYLOGGER ~ REMOTE ACCESS ~ DDOS ~ ENCRYPTER | 2020 Webcam screenshot, Desktop screenshot, Microphone recorder, Stealer(Passwords, Credit Cards, Cookies, History, Bookmarks), Keylogger, Autorun(Registry, Taskscheduler, StartupDIR), DDoS(HTTP, UDP, SYN, ICMP, SLOWLORIS), Bruteforce (SSH, FTP, Telnet), TaskManager, Port Scanner, Wifi scanner, File encryptor/dycryptor, Get installed antivirus, Check if in VirtualBox, SandBox, Debugger, Power control, Block system input, BSoD, ForkBomb, Text to speech, Clipboard control, System volume control, Send key press, Move cursor, Get cursor position, Get active window title, Get battery status, Min/Max all windows, Change wallpapers, Download & Upload file(anonfile.com), Get BSSID, Get coordinates by BSSID, WHOIS, Geoplugin, VirusTotal checker. Create webcame S.S : inferno.exe WEBCAM_SCREENSHOT "screenshot.jpg" "4500" "1" Disable monitor : inferno.exe MONITOR "OFF" [Hidden Content]
  12. Features Paradoxia Console Feature Description Easy to use Paradoxia is extremely easy to use, So far the easiest rat! Root Shell - Automatic Client build Build Paradoxia Client easily with or without the icon of your choice. Multithreaded Multithreaded Console server, You can get multiple sessions. Toast Notifications Desktop notification on new session Configurable Settings Configurable values in paradoxia.ini Kill Sessions Kill Sessions without getting in sesssion. View Session information View Session information without getting in Session. Paradoxia Client Feature Description Stealth Runs in background. Full File Access Full access to the entire file system. Persistence Installs inside APPDATA and has startup persistence via Registry key. Upload / Download Files Upload and download files. Screenshot Take screenshot. Mic Recording Record Microphone. Chrome Password Recovery Dump Chrome Passwords using Reflective DLL (Does not work on latest version) :shipit: Keylogger Log Keystrokes and save to file via Reflective DLL. Geolocate Geolocate Paradoxia Client. Process Info Get Process information. DLL Injection Reflective DLL Injection over Socket, Load your own Reflective DLL, OR use ones available here. Power off Power off the Client system. Reboot Reboot the client system. MSVC + MINGW Support Visual studio project is also included. Reverse Shell Stable Reverse Shell. Small Client Maximum size is 30kb without icon. [hide][Hidden Content]]
  13. [Hidden Content]
  14. Malware program that includes a back door for administrative control over the target computer using Telegram. Features WebCam Threading Tasklist TaskKill Easy for Beginners ! [hide][Hidden Content]]
  15. What's SMTP/Mail access Cracker V3 ? > Crack Smtp > Crack Mail Access [hide][Hidden Content]]
  16. Features Autorun Information of system Browse directories, delete files / folders View all processes Ability to delete a process Real time keylogger Encrypting files and directories Shutting down the operating system Throw Error MessageBox [hide][Hidden Content]]
  17. A pure python, post-exploitation, RAT (Remote Administration Tool) for macOS / OSX. Features Create a simple terminal instance For use on ALL APPLE OS's (macOS, OSX etc.) Undetected by anti-virus Undetectable by user Multi-threaded No dependencies (pure python) Persistent or non-persistent Retrieve any passwords Download and upload files undetected Get root via local privilege escalation Auto installer, simply run OSX-RAT on your target and the rest is handled automatically. Access to all phone data, files and chats from any apps [hide][Hidden Content]]
  18. [hide][Hidden Content]]
  19. [hide][Hidden Content]]
  20. Wifipumpkin3 wifipumpkin3 is a powerful framework for rogue access point attack, written in Python, that allows and offers to security researchers, red teamers, and reverse engineers to mount a wireless network to conduct a man-in-the-middle attack. Main Features Rogue access point attack Man-in-the-middle attack Rogue Dns Server Captive portal attack (captiveflask) Intercept, inspect, modify and replay web traffic WiFi networks scanning DNS monitoring service Credentials harvesting Transparent Proxies LLMNR, NBT-NS and MDNS poisoner (Responder3) and more! Changelog v1.0.7 Added added WorkProcess class for execute comand with Qprocess added correctly package beautifulsoup4 into requirements.txt added command banner: display an awesome wp3 banner added many improvements into system modules added improves module for running in background added command kill: terminate a module in background by id added option on captiveflask to force redirect sucessful template added set ssid with any caracter utf8 Changed moved command info to extensions directory changed more flexible python version into dependencies #36 improves the architecture files extensions commands Deprecated Removed removed folder core/controls from file structure arch removed bs4==0.0.1 Dummy package for Beautiful Soup Fixed fixed improves method setIptables from wirelessmode default mode fixed clear dependencies not used from requirements files fixed include message: the module not found or failed to import. fixed typo name proxys to proxies fixed version of dnslib from pydns_server #49 restricting version module problems fixed description tool on setup.py file fixed mode docker parser command line #56 [hide][Hidden Content]]
  21. 2K MAIL ACCESS ACCOUNTS 100% WORKING 07/31/2020 [Hidden Content]
  22. The most powerful, flexible & easiest tool to protect your WordPress media files in existence! Demo: [Hidden Content] [HIDE][Hidden Content]]
  23. itsMe

    Loki - Remote Access Tool

    Loki Loki is a simple Remote Access Tool. Loki uses RSA-2048 with AES-256 to keep your communication with infected machines secure. Requirements Python 3.6.x | 3.7.x | 3.8.x Server tested on Windows 10 Kali Linux Bot tested on Windows 10 Payload generator tested on Windows 10 Features Upload & Download Chrome Launching Persistence Screenshare Screenshot Keylogger SFTP SSH [HIDE][Hidden Content]]
  24. The internet without borders Protect your privacy, hide your IP, unblock websites [HIDE][Hidden Content]]
  25. [HIDE][Hidden Content]]